Google revealed a critical security hole on Monday, affecting an open-source Qualcomm component used in thousands of Android devices. READ MORE → This vulnerability, tracked as CVE-2026-21385, has received a high-severity classification, with a CVSS score of 7.8. This vulnerability presents serious dangers to users as it was actively weaponized in the ecosystem.
CVE-2026-21385 is a buffer over-read in the Graphics component which could let attackers read sensitive data stored in memory. The company published additional information about the vulnerability in a security bulletin published on March 1, 2026. Immediately following the disclosure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) jumped into action. Then, on March 3, 2026, they included CVE-2026-21385 in their Known Exploited Vulnerabilities (KEV) catalog.
Details of the Vulnerability
Qualcomm characterized CVE-2026-21385 as an integer overflow, explaining that “Memory corruption when adding user-supplied data without checking available buffer space” is what leads to this critical flaw. This glaring security concern undermines the very integrity of all user data. It undermines the broader security of these impacted devices.
Google noted that there are indications that “CVE-2026-21385 may be under limited, targeted exploitation.” This uncharacteristically terse statement underscores the urgency for device manufacturers and users to act on the vulnerability immediately.
Impact on Devices and Patch Requirements
CVE-2026-21385 mainly affects Android devices that depend on Qualcomm’s open-source component. Coordinated effort to remediate CISA has intervened and remediated this vulnerability. So they required that Federal Civilian Executive Branch (FCEB) agencies make the needed improvements by March 24, 2026. As we noted above, the second patch level release already contains that patch for CVE-2026-21385. Beyond that it provides critical Kernel components fixes and updates from other vendors such as Arm, Imagination Technologies, MediaTek and Unisoc.
As the deadline approaches for implementing these fixes, it is imperative for affected agencies and manufacturers to prioritize the update process to ensure user safety and system integrity.
Broader Context in Cybersecurity
This incident underscores the ongoing challenges within cybersecurity, particularly concerning vulnerabilities in widely-used software components. With the changing face of cyber threats, constant vigilance and timely patching is a necessity for organizations and individual end users alike.

