CVE-2026-21385: the memory vulnerability in Qualcomm that could be being exploited on Android

Published 4 min de lectura 140 reading

Google and Qualcomm have confirmed the existence of a high-gravity vulnerability in an open-source component of Qualcomm that is integrated into many Android devices, and there are indications that it has already been used in targeted attacks. The failure identified as CVE-2026-21385 affects the graphic module and is due to an error in memory management - an overflow / reading out of limits caused by an arithmetic operation over sizes (integer overflow) that ends up reading data beyond the reserved space -, something that Qualcomm describes in his security bulletin as a memory corruption by adding data supplied by the user without verifying the available space ( Qualcomm's notice) and that Google reflected in its monthly Android security note ( March 2026 newsletter).

In simple terms, a reading or writing outside the limits of a buffer can allow an attacker to obtain information that should not be accessible or even run code with higher privileges, depending on how the condition is exploited. In this particular case, Qualcomm explains that the root of the problem is a sum or calculation of size that exceeds what the buffer can contain, and that results in memory corruption. Although manufacturers often close these tracks with patches, the detail of concern is that Google has indicated that there are signs of a holding limited and directed, which suggests that at least in some malicious environments the failure is already being exploited.

CVE-2026-21385: the memory vulnerability in Qualcomm that could be being exploited on Android
Image generated with IA.

The time chain behind the discovery is also relevant. According to Qualcomm, vulnerability was reported through the Android security team on December 18, 2025 and customers were reported on February 2, 2026. Google included the correction within its March 2026 update, which not only addresses this incidence, but fixes a total of 129 security failures, including critical problems that allow remote code execution or privilege escalation ( detail CVE-2026-21385 in NVD and detail CVE-2026-0006 in NVD). The Google newsletter presents two levels of parking - 2026-03-01 and 2026-03-05 - to facilitate the application of corrections to partners and manufacturers according to their calendar and device support; the second level also includes corrections for kernel components and contributions from suppliers such as Arm, Imagination Technologies, MediaTek, Qualcomm and Unisoc ( Android newsletter).

For the average user the good news is that the mitigation is clear: install the patches that publish both Google and the phone manufacturer. However, the reality of the Android ecosystem implies that the availability of the patch depends on the manufacturer and the model; some devices will receive correction quickly and others will take longer, or in cases of very old terminals may never arrive. Update the operating system and security patches as soon as they are available It's the most effective defense. Check in Settings > Security or in the system information section the "safety patch level" and wait for your manufacturer to publish the corresponding package.

Meanwhile, there are practical measures that help reduce risk: avoid installing applications outside official stores, limit permissions to apps - especially permissions related to storage, camera or code execution - and keep Google Play (Play Protect) protections on. For companies and device managers, in addition to applying the patches as soon as possible, it is appropriate to monitor telemetry and security alerts, to implement unauthorised application blocking policies and to have endpoints management solutions to enable centrally deployable updates.

CVE-2026-21385: the memory vulnerability in Qualcomm that could be being exploited on Android
Image generated with IA.

For now there are no detailed public descriptions of how vulnerability is being exploited on the ground, and that is intentional: to disseminate complete technical data when there are signs of active exploitation can facilitate the reproduction of the attack. Even so, the existence of signs of use in the real world forces us to take the matter seriously. If you notice strange behaviors on your phone - unexpected battery consumption, unusual network activity or rare permit requests - update and, if necessary, contact your manufacturer's support.

The episode is a reminder that low-level software in chips and controllers, often developed by third parties and reused in multiple brands, is a critical attack surface. A single vulnerable bookstore can affect millions of devices, and coordination between discoverers, Google, manufacturers and hardware providers is key to correct problems before they spread. To read the official sources and technical detail published by Google and Qualcomm you can check the Android security newsletter ( March 2026) and the notice of Qualcomm ( qualcomm bulletin), as well as the entries in the NIST vulnerability database for the above-mentioned CVE ( CVE-2026-21385 and CVE-2026-0006).

In short, the detection of CVE-2026-21385 underlines the importance of keeping up-to-date devices and of manufacturers accelerating patch deployment. Although the operation seems limited and directed for now, the nature of the failure makes it prudent not to delay the installation of the updates when they reach the device.

Coverage

Related

More news on the same subject.