Site icon TheCyberThrone

CISA Adds Qualcomm Vulnerabilities to KEV Catalog

Advertisements

On June 3, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) Catalog to include three newly discovered and actively exploited vulnerabilities in Qualcomm Adreno GPU drivers. These security flaws affect a wide range of Android-based devices, including smartphones and tablets that utilize Qualcomm chipsets.

Overview of the Vulnerabilities

The three vulnerabilities, now added to the KEV Catalog, are classified as high-risk due to active exploitation in the wild. They reside within Qualcomm’s Adreno GPU kernel-mode drivers, which are responsible for graphics rendering on a substantial number of Android devices.

⚠️ 1. CVE-2025-21479 – Improper Authorization Vulnerability

⚠️ 2. CVE-2025-21480 – Authorization Bypass via GPU Interface

⚠️ 3. CVE-2025-27038 – Use-After-Free in GPU Driver

🚨 Why It Matters

The Adreno GPU drivers are widely integrated across Qualcomm Snapdragon chipsets, which power a vast majority of Android devices globally. Exploiting these flaws gives attackers a direct path to the core of the Android operating system, allowing:

🛠️ Qualcomm’s Response

In response to these reports, Qualcomm has issued security patches as part of its May and June 2025 security bulletins. Device manufacturers, including Samsung, Google, Xiaomi, and others, have been notified and are expected to push firmware updates to affected devices.

CISA’s Directive

CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies must apply vendor-released patches for these vulnerabilities by a specific deadline, which is generally within 3 weeks of KEV inclusion. Private sector organizations are strongly encouraged to follow suit to minimize their exposure.

🔐 Recommendations for Organizations and End Users

For Enterprises and SOC Teams:

For End Users:

📚 Key Takeaway

The addition of these Qualcomm vulnerabilities to CISA’s KEV Catalog reflects an increasing focus on mobile device security as part of the broader cyber threat landscape. As mobile endpoints grow in critical importance—especially in BYOD and hybrid work environments—keeping Android firmware up to date is no longer optional, but essential.

Exit mobile version