Overview
CVE-2026-21385 is a memory corruption vulnerability in Qualcomm chipset firmware. The flaw occurs due to improper use of alignment values during memory allocation, leading to an integer overflow (CWE-190) that can corrupt adjacent memory. A local attacker with low privileges can exploit this to achieve arbitrary code execution, full data disclosure, or a denial-of-service condition on the affected device.
Rapid KEV Listing: Evidence of Zero-Day Exploitation
This CVE achieved an exceptionally fast CISA KEV listing: published March 2, added to KEV March 3 (one day). This rapid timeline is a strong indicator of active, in-the-wild exploitation prior to public disclosure.
What This Likely Means
- Pre-disclosure exploitation phase: The vulnerability was likely discovered in the wild weeks or months before March 2, then reported through responsible disclosure channels (possibly Google TAG, Amnesty International Security Lab, or similar threat-intelligence groups).
- Coordinated embargo & disclosure: Qualcomm, Google (Android), and CISA coordinated the public release:
- Qualcomm published the March 2026 Security Bulletin with patches
- Google released the Android 2026-03-01 security patch simultaneously
- CISA added the CVE to KEV on March 3 with evidence in hand
- Historical pattern: Qualcomm chipset vulnerabilities are frequently discovered in targeted surveillance/spyware campaigns (against journalists, activists, and dissidents). This exploit pattern mirrors previous zero-days like those in Pegasus.
Vulnerability Description
Memory corruption while using alignments for memory allocation.
The root cause is an integer overflow or wraparound (CWE-190) triggered when alignment parameters used during dynamic memory allocation are not properly validated. When a crafted alignment value causes the computed allocation size to wrap around, the allocator returns a buffer that is smaller than expected. Subsequent writes to this undersized buffer corrupt adjacent heap memory, which an attacker can leverage for code execution at the firmware or kernel level.
Affected Components
This vulnerability affects firmware across a massive range of Qualcomm chipsets spanning mobile, automotive, IoT, audio, connectivity, wearable, compute, and XR platforms. Over 230 distinct hardware configurations are listed in the NVD.
Snapdragon Mobile Platforms
Automotive & IoT
Connectivity & Modems
XR, Wearable & Compute
Audio Codecs & Amplifiers
Show additional affected chipsets & components…
Am I Affected? Consumer Guidance
With 230+ affected chipsets spanning nearly a decade of Qualcomm products, determining if your device is vulnerable can be challenging. Here's practical guidance by platform.
Samsung Galaxy Series
- Galaxy S25: Snapdragon 8 Elite ✓ affected
- Galaxy S24: Snapdragon 8 Gen 3 ✓ affected
- Galaxy S23: Snapdragon 8 Gen 2 ✓ affected
- Galaxy S22: Snapdragon 8 Gen 1 ✓ affected
- Galaxy S21: Snapdragon 888 ✓ affected
Also affected: OnePlus flagship models, Xiaomi flagship models, and virtually all Android phones with Snapdragon processors from ~2017 onward.
Google Pixel Phones
However, older Pixel phones used Qualcomm Snapdragon SoCs and may be affected:
- Pixel 5 / 5a: Snapdragon 765G — not explicitly listed, but closely related to listed chipsets
- Pixel 4 / 4a: Snapdragon 855 / 730G — similar era chipsets
- Pixel 3 / 3a: Snapdragon 845 / 670
⚠ Pixel 5 and older are past Google's end-of-life for security updates and may never receive a patch for this vulnerability. Consider replacing these devices.
Apple iPhones & iPads
- iPhone 12 / 13 series: Use Qualcomm Snapdragon X55 5G modem ✓ modem is on the affected list
- iPhone 14 series: Uses Qualcomm Snapdragon X65 5G modem ✓ modem is on the affected list
- iPhone 15 / 16 series: Use newer Qualcomm modems (X70/X75) — not explicitly listed in this advisory
- iPads with cellular: Also use Qualcomm modems in many models
Key distinction: While iPhones contain Qualcomm modem components, this CVE is a Qualcomm platform firmware vulnerability. Apple controls its own firmware stack independently and Apple is not listed as an affected vendor in this advisory. The exploitability of this specific flaw through just the modem component is unclear.
Bottom line for iPhone users: This CVE is primarily an Android / Windows on ARM / IoT concern. There is no Apple security advisory related to CVE-2026-21385 at this time. Keep your iPhone updated to the latest iOS version.
Windows Copilot+ PCs (Snapdragon X Elite Laptops)
- Microsoft Surface Laptop (Snapdragon X Elite / SC8380XP) ✓ affected
- Lenovo Yoga Slim 7x, ThinkPad T14s Gen 6
- Dell XPS 13 (2024, ARM version)
- HP OmniBook X, ASUS Vivobook S 15
All Windows on ARM devices using Snapdragon X Elite or X Plus chipsets are impacted.
How to Identify Your Chipset
| Platform | Steps |
|---|---|
| Android | Settings → About Phone → Processor, or install CPU-Z / DevCheck from the Play Store |
| Windows | Settings → System → About → Processor field, or press Win+R and type msinfo32 |
| Automotive | Check your vehicle's infotainment system "About" menu, or consult your manufacturer's website |
How to Verify You're Patched
| Platform | How to Check |
|---|---|
| Android | Settings → About Phone → Android security patch level — must show 2026-03-01 or later |
| Windows on ARM | Settings → Windows Update + your OEM's firmware tool (Dell Update, Lenovo Vantage, Surface app) |
| IoT / Automotive | Check with your device or vehicle manufacturer for firmware update availability |
Quick Action Guide
- Assume you're affected if you have any Qualcomm Snapdragon device from ~2017 onward.
- Update immediately — Android: install all system updates until patch level reads
2026-03-01or later. Windows ARM: run Windows Update and your OEM firmware tool. - Note: Some OEMs lag behind by weeks. Samsung, Google, and OnePlus typically patch quickly. Budget brands may take longer.
- If no patch is available: Avoid untrusted apps, disable USB debugging, and restrict local access until updates arrive.
Impact
| Impact Area | Detail |
|---|---|
| Confidentiality | High — Full disclosure of sensitive data in memory |
| Integrity | High — Arbitrary code execution at firmware/kernel level |
| Availability | High — Complete denial of service to the device |
| Attack Vector | Local — attacker needs local access or a local process on the device |
| Privileges Required | Low — minimal user-level privileges required |
| User Interaction | None — no user action needed to trigger |
Mitigation & Remediation
Recommended Actions
- Apply the Qualcomm March 2026 Security Bulletin patch — available from Qualcomm and distributed through OEM firmware updates.
- Apply the Android March 2026 Security Patch Level (2026-03-01) — addresses this CVE for Android devices using affected Qualcomm SoCs.
- Ensure all affected devices receive the latest firmware/baseband updates from their OEM.
- Monitor CISA KEV Catalog for any updated guidance.
- Restrict local access and enforce least-privilege policies on affected systems (automotive head units, IoT gateways, robotics platforms, etc.).
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2026-21385 |
| Vendor / Product | Qualcomm — Multiple Chipsets |
| NVD Published | 2026-03-02 |
| NVD Last Modified | 2026-03-04 |
| CVSS 3.1 Score | 7.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-190 — Integer Overflow or Wraparound |
| CISA KEV Added | 2026-03-03 |
| CISA KEV Deadline | 2026-03-24 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2026-03-02 | CVE published on NVD; Qualcomm March 2026 Security Bulletin released |
| 2026-03-03 | Added to CISA Known Exploited Vulnerabilities Catalog |
| 2026-03-04 | NVD record last modified |
| 2026-03-24 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2026-21385 | Vulnerability Database |
| Qualcomm March 2026 Security Bulletin | Vendor Advisory / Patch |
| Android Security Bulletin — 2026-03-01 | Vendor Advisory |
| CISA KEV Catalog Entry | US Government |
| CISA BOD 22-01 | Remediation Directive |
| CWE-190 — Integer Overflow or Wraparound | Weakness Classification |