Google Patches 129 Android Vulnerabilities, Including an Actively Exploited Qualcomm Zero-Day

What Happened
Google released its March 2026 Android Security Bulletin on March 3, patching 129 vulnerabilities across the Android ecosystem. Among them: CVE-2026-21385, a high-severity zero-day in Qualcomm's Display and Graphics component that Google confirmed is under active, targeted exploitation.
This is one of the largest Android security updates in recent years — both in sheer volume and in the severity of what it addresses.
The Zero-Day: CVE-2026-21385
CVE-2026-21385 is an integer overflow vulnerability in Qualcomm's Graphics subcomponent. When exploited, it triggers memory corruption that a local attacker can leverage to escalate privileges on the device.
Here's what makes it particularly concerning:
- 235 Qualcomm chipsets affected — This isn't a narrow issue targeting a handful of devices. The vulnerability spans the Snapdragon 6, 7, and 8 series, as well as older SoCs still in widespread use across budget and mid-range phones
- Active exploitation confirmed — Google noted "there are indications that CVE-2026-21385 may be under limited, targeted exploitation," the standard language for confirmed in-the-wild abuse
- CISA added it to KEV — The U.S. Cybersecurity and Infrastructure Security Agency added CVE-2026-21385 to its Known Exploited Vulnerabilities catalog on March 3, giving Federal Civilian Executive Branch agencies until March 24, 2026 to apply fixes
Qualcomm described the vulnerability in its own advisory as exploitable by a local attacker, which typically means the attacker needs some level of access to the device first — either through a malicious app, a compromised app, or chaining it with another vulnerability that provides initial access.
The Critical RCE: CVE-2026-0006
Beyond the zero-day, the update also patches CVE-2026-0006, a critical remote code execution flaw in the System component. This one doesn't require any additional privileges or user interaction to exploit — the kind of vulnerability that keeps security teams up at night.
A remote attacker could potentially execute arbitrary code on a target device without the user doing anything beyond receiving a specially crafted message or connection.
Patch Levels and Distribution
The bulletin includes two patch levels:
- 2026-03-01 — Core Android framework and system component fixes
- 2026-03-05 — Hardware-specific fixes from Arm, Imagination Technologies, MediaTek, Qualcomm, and Unisoc
This split exists to give OEMs flexibility to ship framework fixes faster while hardware-specific patches may take longer to validate across different device configurations.
What You Need to Do
If You Use an Android Device
Check for security updates: Settings → Security & privacy → System & updates → Security update
If your device shows a patch level of 2026-03-05 or later, you're covered. If it shows an earlier date, the update either hasn't reached your device yet or your OEM hasn't shipped it.
The reality of Android's update ecosystem: Google ships the patches, but your device manufacturer and carrier determine when — or if — they reach your phone. Pixel devices get updates fastest. Samsung, OnePlus, and other major OEMs typically follow within weeks. Older or budget devices may never receive these patches.
If You Manage a Mobile Fleet
- Prioritize devices with Qualcomm chipsets — the 235-chipset scope of CVE-2026-21385 means most Android devices in your fleet are likely affected
- Enforce minimum patch levels — if your MDM supports it, set 2026-03-05 as the minimum acceptable security patch level
- Monitor for exploitation indicators — while specific IoCs for CVE-2026-21385 haven't been published, watch for unusual privilege escalation attempts or graphics driver crashes in device logs
- Track the CISA KEV deadline — federal agencies have until March 24, but the deadline is a useful benchmark for any organization
If You Build Android Apps
This vulnerability is in the OS and hardware drivers, not in your app code. But it reinforces why apps should follow the principle of least privilege. An app with unnecessary permissions becomes a more attractive vector for attackers looking to chain vulnerabilities.
The Bigger Picture
129 vulnerabilities in a single monthly update is significant, even by Android's standards. The combination of an actively exploited zero-day affecting 235 chipsets, a critical zero-click RCE in the System component, and 10 additional critical-severity bugs paints a clear picture: the Android attack surface is vast, and attackers are actively probing it.
The fragmented Android update ecosystem makes this worse. Google can patch a vulnerability, but if the patch doesn't reach devices for weeks or months — or never reaches them at all — the window of exploitation stays open.
For enterprises managing mobile fleets, this update is a reminder that mobile device security isn't optional. For individual users, the advice is simple: update your phone, and if your phone isn't getting updates anymore, it's time to consider a new one.
Sources
- Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited — The Hacker News
- Android Security Bulletin — March 2026 — Android Open Source Project
- Google addresses actively exploited Qualcomm zero-day in fresh batch of 129 Android vulnerabilities — CyberScoop
- High-severity Qualcomm bug hits Android devices in targeted attacks — Malwarebytes
- Google's Biggest Android Security Update in Years Fixes 129 Bugs — TechRepublic