Google and Qualcomm have confirmed the existence of a high-gravity vulnerability in an open-source component of Qualcomm that is integrated into many Android devices, and there are indications that it has already been used in targeted attacks. The failure identified as CVE-2026-21385 affects the graphic module and is due to an error in memory management - an overflow / reading out of limits caused by an arithmetic operation over sizes (integer overflow) that ends up reading data beyond the reserved space -, something that Qualcomm describes in his security bulletin as a memory corruption by adding data supplied by the user without verifying the available space ( Qualcomm's notice) and that Google reflected in its monthly Android security note ( March 2026 newsletter).
In simple terms, a reading or writing outside the limits of a buffer can allow an attacker to obtain information that should not be accessible or even run code with higher privileges, depending on how the condition is exploited. In this particular case, Qualcomm explains that the root of the problem is a sum or calculation of size that exceeds what the buffer can contain, and that results in memory corruption. Although manufacturers often close these tracks with patches, the detail of concern is that Google has indicated that there are signs of a holding limited and directed, which suggests that at least in some malicious environments the failure is already being exploited.

The time chain behind the discovery is also relevant. According to Qualcomm, vulnerability was reported through the Android security team on December 18, 2025 and customers were reported on February 2, 2026. Google included the correction within its March 2026 update, which not only addresses this incidence, but fixes a total of 129 security failures, including critical problems that allow remote code execution or privilege escalation ( detail CVE-2026-21385 in NVD and detail CVE-2026-0006 in NVD). The Google newsletter presents two levels of parking - 2026-03-01 and 2026-03-05 - to facilitate the application of corrections to partners and manufacturers according to their calendar and device support; the second level also includes corrections for kernel components and contributions from suppliers such as Arm, Imagination Technologies, MediaTek, Qualcomm and Unisoc ( Android newsletter).
For the average user the good news is that the mitigation is clear: install the patches that publish both Google and the phone manufacturer. However, the reality of the Android ecosystem implies that the availability of the patch depends on the manufacturer and the model; some devices will receive correction quickly and others will take longer, or in cases of very old terminals may never arrive. Update the operating system and security patches as soon as they are available It's the most effective defense. Check in Settings > Security or in the system information section the "safety patch level" and wait for your manufacturer to publish the corresponding package.
Meanwhile, there are practical measures that help reduce risk: avoid installing applications outside official stores, limit permissions to apps - especially permissions related to storage, camera or code execution - and keep Google Play (Play Protect) protections on. For companies and device managers, in addition to applying the patches as soon as possible, it is appropriate to monitor telemetry and security alerts, to implement unauthorised application blocking policies and to have endpoints management solutions to enable centrally deployable updates.

For now there are no detailed public descriptions of how vulnerability is being exploited on the ground, and that is intentional: to disseminate complete technical data when there are signs of active exploitation can facilitate the reproduction of the attack. Even so, the existence of signs of use in the real world forces us to take the matter seriously. If you notice strange behaviors on your phone - unexpected battery consumption, unusual network activity or rare permit requests - update and, if necessary, contact your manufacturer's support.
The episode is a reminder that low-level software in chips and controllers, often developed by third parties and reused in multiple brands, is a critical attack surface. A single vulnerable bookstore can affect millions of devices, and coordination between discoverers, Google, manufacturers and hardware providers is key to correct problems before they spread. To read the official sources and technical detail published by Google and Qualcomm you can check the Android security newsletter ( March 2026) and the notice of Qualcomm ( qualcomm bulletin), as well as the entries in the NIST vulnerability database for the above-mentioned CVE ( CVE-2026-21385 and CVE-2026-0006).
In short, the detection of CVE-2026-21385 underlines the importance of keeping up-to-date devices and of manufacturers accelerating patch deployment. Although the operation seems limited and directed for now, the nature of the failure makes it prudent not to delay the installation of the updates when they reach the device.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...