PT-2025-23468 · Qualcomm · Qualcomm Snapdragon
Published
2025-01-24
·
Updated
2026-01-14
·
CVE-2025-21479
CVSS v3.1
8.6
8.6
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Qualcomm chipsets (affected versions not specified)
Meta Quest 3/3S versions August 7, 2025 update and earlier
Samsung S23 (affected versions not specified)
Description
A flaw exists in the Qualcomm Adreno GPU firmware that allows unauthorized command execution in the GPU micronode. This can lead to memory corruption when a specific sequence of commands is processed. The issue is actively exploited and has been used to gain root access on devices like the Meta Quest 3/3S and Samsung S23. Exploitation involves leveraging the flaw through a combination of page table attacks to achieve kernel-level control. The GPU microcode is shared across multiple products, including IoT devices, phones, laptops, and potentially future automotive systems. The vulnerability has been addressed in the August 2025 Android security update and subsequent Meta Quest firmware updates. It is reported that the vulnerability allows userspace to run privileged GPU commands, enabling read/write access to the kernel via fake pagetables and device compromise.
Recommendations
For Meta Quest 3/3S devices, disable updates and the Oculus updater (
com.oculus.updater) to prevent patching.
For Samsung S23 devices, apply the latest firmware updates to address the vulnerability.
For all affected Qualcomm chipsets, apply the August 2025 Android security update or later to mitigate the risk.Exploit
Fix
LPE
RCE
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-06374
CVE-2025-21479
Affected Products
Qualcomm Snapdragon
References · 86
- 🔥 https://github.com/FreeXR/eureka_panther-adreno-gpu-exploit-1⭐ 2 · Exploit
- https://bdu.fstec.ru/vul/2025-06374 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-21479 · Security Note
- https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html · Vendor Advisory
- https://twitter.com/ksg93rd/status/2011447957824901159 · Twitter Post
- https://twitter.com/jbhall56/status/1952702221092540731 · Twitter Post
- https://t.me/ckure/15699 · Telegram Post
- https://twitter.com/macdonaldncode/status/1930066197455810957 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1myrps8/top_10_trending_cves_24082025 · Reddit Post
- https://twitter.com/wvipersg/status/1953012839611867487 · Twitter Post
- https://t.me/c/1627154862/198736 · Note
- https://reddit.com/r/CVEWatch/comments/1mxxkel/top_10_trending_cves_23082025 · Reddit Post
- https://reddit.com/r/CVEWatch/comments/1oqrkao/top_10_trending_cves_07112025 · Reddit Post
- https://reddit.com/r/CyberDudeBivash/comments/1mwxqf4/cyberdudebivash_threatwire_21st_edition_why_gpus · Reddit Post
- https://twitter.com/grok/status/1953900454460715320 · Twitter Post