Google has initiated the distribution of its latest Android security updates, addressing nearly 130 vulnerabilities. Among these is a critical zero-day flaw affecting Qualcomm chipsets.
Exploited Qualcomm Zero-Day Details
Identified as CVE-2026-21385, this vulnerability has a CVSS score of 7.8 and influences the graphics components of over 200 Qualcomm chipsets. The flaw, described as an integer overflow that leads to memory corruption, poses significant risks.
Adam Boynton, Jamf’s senior enterprise strategy manager, emphasizes the potential for attackers to bypass security controls, potentially allowing unauthorized system access.
Timeline and Exploitation Insights
Qualcomm’s advisory reveals that the issue was reported on December 18, 2025, via the Google Android Security team. Customers were informed by February 2, with public disclosure occurring this Monday.
While Google has not detailed specific attacks, the March 2026 security bulletin suggests limited, targeted exploitation. Such vulnerabilities are often targeted by commercial spyware organizations.
Comprehensive Patch Deployment
This month’s updates come in two segments. The 2026-03-05 patch level addresses over 60 vulnerabilities, spanning kernel, Arm, and several other components. Earlier, the 2026-03-01 patch level fixed over 50 issues in Framework and System components, including critical flaws potentially leading to remote code execution.
Google assures users that devices updated to 2026-03-05 or beyond are safeguarded against these vulnerabilities.
Additional System Updates
Alongside Android, Google rolled out updates for two Wear OS vulnerabilities impacting its Framework and System components. These updates also incorporate all security improvements from Android’s March 2026 bulletin.
Notably, there are no unique patches for Android Automotive OS or Android XR in this cycle.
For more information and related updates, check out the latest Android 17 beta release and other security patches from major tech firms.
