machine learning | TechCrunch 06月04日 03:06
Phone chipmaker Qualcomm fixes three zero-days exploited by hackers
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

高通公司于周一发布补丁,修复了数十款芯片中的一系列漏洞,其中包括三个零日漏洞,这些漏洞可能已被用于黑客攻击活动。谷歌威胁分析小组(TAG)报告了这三个零日漏洞(CVE-2025-21479、CVE-2025-21480和CVE-2025-27038)。由于安卓的开源和分布式特性,设备制造商需要应用高通提供的补丁,这意味着即使有补丁可用,一些设备可能在几周内仍然容易受到攻击。高通已于五月份向设备制造商提供了补丁,并强烈建议尽快在受影响的设备上部署更新。

🚨 高通修复了数十款芯片中的多个漏洞,其中包括三个零日漏洞,这些漏洞可能被用于黑客攻击。

🔍 谷歌的威胁分析小组(TAG)报告了这三个零日漏洞(CVE-2025-21479、CVE-2025-21480和CVE-2025-27038)。零日漏洞是指在被发现时,软件或硬件制造商未知的安全漏洞,对网络犯罪分子和政府黑客极具价值。

📱 由于安卓的开源和分布式特性,设备制造商需要应用高通提供的补丁。这意味着即使有补丁可用,一些设备可能在几周内仍然容易受到攻击。

🛠️ 高通已于五月份向设备制造商提供了补丁,并强烈建议尽快在受影响的设备上部署更新。谷歌表示其Pixel设备不受这些漏洞的影响。

Chipmaker giant Qualcomm released patches on Monday fixing a series of vulnerabilities in dozens of chips, including three zero-days that the company said may be in use as part of hacking campaigns. 

Qualcomm cited Google’s Threat Analysis Group, or TAG, which investigates government-backed cyberattacks, saying the three flaws “may be under limited, targeted exploitation.” 

According to the company’s bulletin, Google’s Android security team reported the three zero-days (CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038) to Qualcomm in February. Zero-days are security vulnerabilities that are not known to the software or hardware maker at the time of their discovery, making them extremely valuable for cybercriminals and government hackers. 

Because of Android’s open source and distributed nature, it’s now up to device manufacturers to apply the patches provided by Qualcomm, which means some devices may still be vulnerable for several more weeks, despite the fact that there are patches available. 

Do you have more information about these Qualcomm zero-days? Or other zero-day exploits or zero-day makers? From a non-work device and network, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

Qualcomm said in the bulletin that the patches “have been made available to [device makers] in May together with a strong recommendation to deploy the update on affected devices as soon as possible.”

Google spokesperson Ed Fernandez told TechCrunch that the company’s Pixel devices are not affected by these Qualcomm vulnerabilities.

When reached by TechCrunch, a spokesperson for Google’s TAG did not immediately provide more information about these vulnerabilities, and the circumstances in which TAG found them. 

Qualcomm did not respond to a request for comment.

Chipsets found in mobile devices are frequent targets for hackers and zero-day exploit developers because chips generally have wide access to the rest of the operating system, which means hackers can jump from there to other parts of the device that may hold sensitive data. 

In the last few months, there have been documented cases of exploitation against Qualcomm chipsets. Last year, Amnesty International identified a Qualcomm zero-day that was being used by Serbian authorities, likely by using phone unlocking tool maker Cellebrite.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

高通 漏洞 零日漏洞 黑客攻击
相关文章