

Qualcomm has corrected three zero -day vulnerabilities diagnosed within the Adreno images controller which have been actively exploited, being able to be part of ‘hacking campaigns.
The semiconductor organization furnished in May the tool producers a patch to correct the vulnerabilities collected as CVE-2025-21479, CVE-2025-21480 and CVE-2025-27038.
The Google Android security team notified Qualcomm, while the Google risk analysis institution (TAG) indicated that the three vulnerabilities “might be exploited in a constrained and specific way.”
Although many information of this hazard have not been discovered, Qualcomm has reported in the June Security Bulletin that the patch it issued was for the Adreno GPU controller, and entreated the fabicants to display an replace with him as a way to accurate them as quickly as possible within the affected devices.
Of the 3, Qualcomm indicates that CVE-2025-21479 and CVE-2025-21480 attain a classification of vital safety and encompass a “corruption of reminiscence because of the execution of unauthorized commands inside the micronodo of the GPU at the same time as a specific series of instructions is performed.”
The affected chips are severa, and amongst them are Snapdragon 690 5G, Snapdragon 7c+ Gen 3, Snapdragon 870 5G, Snapdragon 888+ 5G, Snapdragon AR1 Gen 1 and the Modem RF X55 5g.