Qualcomm Zero-Day Fixes: Android Chip Vulnerabilities Patched

Qualcomm Addresses Critical Security Vulnerabilities
Qualcomm, a leading chipmaker, has recently issued security patches to resolve a number of vulnerabilities affecting a wide range of its chips.
These updates address three previously unknown, or zero-day, vulnerabilities that the company believes may currently be exploited in active hacking operations.
Details of the Zero-Day Vulnerabilities
The information regarding these vulnerabilities was initially brought to light by Google’s Threat Analysis Group (TAG), a team dedicated to investigating state-sponsored cyberattacks.
According to Qualcomm’s security bulletin, Google’s Android security team reported the three zero-days – identified as CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038 – to Qualcomm in February.
Zero-day vulnerabilities are particularly dangerous as they are unknown to the software or hardware vendor when first discovered, making them highly prized by malicious actors.
Patch Deployment and Device Impact
Due to the open-source nature of Android, the responsibility for implementing these patches now falls to individual device manufacturers.
This means that some devices may remain vulnerable for a period of weeks, even with the availability of the necessary updates.
Qualcomm released the patches to device makers in May, alongside a strong recommendation for swift deployment to affected devices.
Google's Response
A Google spokesperson, Ed Fernandez, confirmed that the company’s Pixel devices are not impacted by these specific Qualcomm vulnerabilities.
Kimberly Samra, representing Google’s TAG, has not yet provided further details regarding the vulnerabilities or the circumstances of their discovery.
Qualcomm's Statement
Qualcomm acknowledged the fixes and encourages users to install security updates as soon as they are released by their device manufacturers, as stated by company spokesperson Dave Schefcik.
Why Chipsets are Targeted
Mobile device chipsets are frequently targeted by hackers and exploit developers due to their extensive access to the operating system.
This broad access allows attackers to potentially move laterally to other parts of the device, accessing sensitive data.
Recent Exploitation Cases
There have been several documented instances of exploitation targeting Qualcomm chipsets in recent months.
Notably, Amnesty International previously identified a Qualcomm zero-day being utilized by Serbian authorities, potentially through the use of tools from phone unlocking vendor Cellebrite.
These incidents underscore the importance of timely security updates for mobile devices.
Related Posts

Google and Apple Release Emergency Security Updates

700credit Data Breach: 5.6 Million Affected

Home Depot Data Breach: Internal Systems Exposed for a Year

Photo Booth Website Flaw Exposes Customer Pictures

Freedom Chat App Security Flaws Expose User Data
