{"id":3476,"date":"2025-06-02T18:45:58","date_gmt":"2025-06-02T17:45:58","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=3476"},"modified":"2025-06-02T18:45:58","modified_gmt":"2025-06-02T17:45:58","slug":"qualcomm-addresses-triple-zero-day-vulnerabilities-targeting-android-devices-through-adreno-gpu","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/qualcomm-addresses-triple-zero-day-vulnerabilities-targeting-android-devices-through-adreno-gpu\/","title":{"rendered":"Qualcomm Addresses Triple Zero-Day Vulnerabilities Targeting Android Devices through Adreno GPU"},"content":{"rendered":"<p>Driver within Adreno GPU.<\/p>\n<p>CVE-2025-21481 (CVSS score: 9.8) &#8211; A use-after-free flaw located in the Direct Rendering Manager (DRM) Driver of Graphics in Adreno GPU.<\/p>\n<p><body><\/p>\n<p>Chipset manufacturer Qualcomm has recently issued security patches to fix three zero-day vulnerabilities within its Adreno Graphics Processing Unit (GPU).<\/p>\n<p>These vulnerabilities, identified as CVE-2025-21479, CVE-2025-21480, and CVE-2025-21481, have been exploited in what the company describes as limited, targeted attacks.<\/p>\n<p>The updates were shipped following the responsible disclosure of these vulnerabilities by Google&#8217;s Android Security team.<\/p>\n<p>The two incorrect authorization vulnerabilities, CVE-2025-21479 and CVE-2025-21480, which hold a CVSS (Common Vulnerability Scoring System) severity score of 8.6, were found in the Graphics Driver component of the Adreno GPU.<\/p>\n<p>They could potentially allow attackers to execute code within the context of the Kernel, leading to leaks of confidential system information or causing system crashes as a result of a Denial of Service attack.<\/p>\n<p>More seriously, CVE-2025-21481, with a CVSS score of 9.8, is a use-after-free flaw located in the DRM Driver of Graphics in the Adreno GPU.<\/p>\n<p>This vulnerability can enable malevolent individuals to execute harmful code, potentially resulting in remote code execution or information leaks, affording the attacker unrestricted access to compromise the confidentiality, integrity, and availability of the exploited system.<\/p>\n<p>These vulnerabilities pose a serious threat to mobile devices as Qualcomm&#8217;s Adreno GPU is used in a majority of Android devices, including premium smartphone models from giants such as Samsung, LG, and Sony.<\/p>\n<p>It is thus imperative that users and enterprises apply the issued patches as quickly as possible in order to safeguard system security and data integrity.<\/p>\n<p>Qualcomm expressed gratitude towards the Google Android Security team for their responsible and timely reporting of these issues.<\/p>\n<p>The company further outlined that users should always ensure that their software versions are up-to-date.<\/p>\n<p>As a good cybersecurity practice, keeping all software and systems updated allows users to benefit from the latest security enhancements.<\/p>\n<h2>Follow-Up Reading:<\/h2>\n<ul>\n<li><a href=\"https:\/\/source.android.com\/security\/reports\/Google\">Google&#8217;s Android Security and Privacy report<\/a><\/li>\n<li><a href=\"https:\/\/cve.mitre.org\/\">National Vulnerability Database<\/a><\/li>\n<li><a href=\"https:\/\/www.qualcomm.com\/company\/product-security\">Qualcomm&#8217;s Product Security Initiative<\/a><\/li>\n<\/ul>\n<p><\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Driver within Adreno GPU. CVE-2025-21481 (CVSS score: 9.8) &#8211; A use-after-free flaw located in the<\/p>\n","protected":false},"author":1,"featured_media":3477,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-3476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=3476"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3476\/revisions"}],"predecessor-version":[{"id":3478,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/3476\/revisions\/3478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/3477"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=3476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=3476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=3476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}