Android Zero-Day CVE-2026-21385 Actively Exploited
Executive Summary
Google has confirmed that a high-severity vulnerability, CVE-2026-21385, affecting a Qualcomm graphics component in the Android ecosystem, is being actively exploited in the wild. The flaw is described as a buffer over-read that can lead to memory corruption. While exploitation is currently assessed as "limited" and "targeted," the presence of a zero-day necessitates immediate action. The patch for this vulnerability is included in the March 2026 Android security bulletin, which addresses a total of 129 security defects.
Key Findings
Vulnerability Profile: CVE-2026-21385
The primary vulnerability is tracked as CVE-2026-21385, with a CVSS score of 7.8 (High). The flaw exists in an open-source Qualcomm Graphics component. According to Qualcomm's advisory, it is an integer overflow leading to memory corruption when processing user-supplied data without proper buffer size validation. The flaw was initially reported to Qualcomm by Google's Android Security team on December 18, 2025.
Active Exploitation
Google's March 2026 bulletin states there are "indications that CVE-2026-21385 may be under limited, targeted exploitation." Details regarding the threat actor, attack vector, and specific Tactics, Techniques, and Procedures (TTPs) have not been disclosed at this time. The adversary remains unidentified.
March 2026 Android Security Bulletin
The patch for CVE-2026-21385 is delivered via the March 2026 Android security update. This is a substantial update, containing fixes for 129 vulnerabilities. The bulletin is split into two patch levels, 2026-03-01 and 2026-03-05, to provide partners with deployment flexibility. The 2026-03-05 level is comprehensive, including fixes for components from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unisoc.
Other Critical Flaws Patched
The update also addresses several other critical vulnerabilities, including:
- CVE-2026-0006: A critical remote code execution (RCE) vulnerability in the System component, requiring no additional privileges or user interaction.
- CVE-2026-0047: A critical privilege escalation bug in the Framework.
- CVE-2025-48631: A critical denial-of-service (DoS) flaw in the System component.
- Seven critical privilege escalation flaws in Kernel components, including CVE-2024-43859 and CVE-2026-0037.
Mitigation & Recommendations
Immediate Patching
All Android devices should be updated to the March 2026 security patch level as soon as possible. It is critical to apply the 2026-03-05 patch level to ensure protection against this exploited vulnerability and other critical component-level flaws.
Threat Hunting & Monitoring
Security teams should monitor for anomalous activity related to device graphics components and memory corruption events. Since no Indicators of Compromise (IOCs) have been released, proactive threat hunting based on behavioral analytics is recommended until more specific intelligence becomes available.
// INTELLIGENCE_SOURCES
// INITIALIZE_SUBSCRIPTION
Receive critical threat intelligence briefings directly to your feed. Join the CyberNewsAI operations center.