CISA flags exploited Qualcomm chipset bug CVE-2026-21385, Android updates now carry the fix


CISA has added CVE-2026-21385 to its Known Exploited Vulnerabilities program, which means federal agencies must remediate by March 24, 2026. The flaw affects multiple Qualcomm chipsets and can cause memory corruption during aligned memory allocation, which can crash a device or enable further exploitation depending on where the bug sits in the graphics stack.

Google also signaled active exploitation in its Android security bulletin. It wrote: “There are indications that CVE-2026-21385 may be under limited, targeted exploitation.”

Public technical detail remains limited, but the timelines matter. CISA lists the vulnerability as added on March 3, 2026, with a hard due date of March 24, 2026, and NVD shows Qualcomm as the CNA with a CVSS 3.1 base score of 7.8 (High).

What we know so far

CVE-2026-21385 is tracked as a Qualcomm issue described as “Memory corruption while using alignments for memory allocation.” NVD classifies the weakness as CWE-190: Integer Overflow or Wraparound, which often means a size or alignment calculation wraps to an unexpected value and leads to unsafe memory operations.

CISA’s entry does not provide exploit telemetry, affected device models, or a public exploit chain. However, the KEV listing strongly suggests real-world exploitation, and Google’s bulletin supports that interpretation with its “limited, targeted” note.

Key details table

FieldValue
CVECVE-2026-21385
VendorQualcomm
Affected scopeMultiple chipsets (varies by device and OEM build)
ClassMemory corruption tied to alignment in memory allocation
WeaknessCWE-190 (Integer Overflow or Wraparound)
CVSS (CNA)7.8 High (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CISA KEV addedMarch 3, 2026
CISA remediation deadlineMarch 24, 2026
Official patch pathAndroid March 2026 updates and OEM firmware/security updates

What “exploited in attacks” likely means in practice

The CVSS vector shown by NVD includes local access and low privileges (PR:L). That often aligns with attacks that start with a malicious app or a foothold on the device, then pivot into a privileged component like a driver or GPU stack. The end result can range from crashes to escalation, depending on the vulnerable code path and device configuration.

Google’s language suggests targeted use, not mass exploitation. That usually points to higher-value operations such as spyware-style campaigns, but no official source has publicly attributed actors or tooling yet.

What to do now

  • Push Android security updates quickly across fleets, especially for devices that rely on Qualcomm chipsets and receive regular OEM security patches.
  • Enforce update compliance in MDM so users cannot defer patches indefinitely, particularly on executive and high-risk profiles.
  • Reduce risky app pathways by blocking unknown sources and tightening app installation policies where your org controls devices.
  • Prioritize high-exposure roles such as journalists, executives, security staff, and admins who face targeted phishing and surveillance attempts.
  • Escalate if you cannot patch. CISA’s required action text includes discontinuing use if mitigations are unavailable, which is blunt but reflects the KEV posture.

Monitoring cues that often accompany memory corruption exploitation

Monitoring areaWhat to look for
Stabilitysudden reboots, repeated GPU or system crashes
Low-level servicesrecurring crashes tied to graphics-related processes after specific app activity
Post-compromise signalssuspicious apps requesting elevated capabilities, abnormal device management changes
Patch behaviordevices stuck on older patch levels despite policy

These indicators do not prove exploitation, but they help you triage devices that warrant deeper inspection.

FAQ

What is CVE-2026-21385?

It is a Qualcomm chipset vulnerability described as “memory corruption while using alignments for memory allocation.”

Is it exploited in the wild?

Google’s Android bulletin says there are indications of “limited, targeted exploitation,” and CISA added it to KEV with a March 24 remediation deadline.

Does this affect all Android phones?

No. Risk varies by device, chipset, and whether the vulnerable Qualcomm component exists in that model’s build.

How do I get the fix?

Install the latest Android security updates available for your device. For managed fleets, rely on OEM security updates and enforce patch-level compliance via MDM.

What if my device no longer receives updates?

Treat it as higher risk and plan replacement or isolation for sensitive use cases, especially if it handles privileged access, corporate email, or confidential data.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages