The Cybersecurity and Infrastructure Safety Company (CISA) has added a vital Qualcomm chipset vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog on March 3, 2026, confirming lively exploitation within the wild.
The flaw, tracked as CVE-2026-21385, impacts a number of Qualcomm chipsets and introduces a critical reminiscence corruption danger that attackers can leverage to compromise affected units.
Vulnerability Overview
The vulnerability stems from an integer overflow situation (CWE-190) that happens throughout reminiscence allocation alignment operations throughout a number of Qualcomm chipsets.
When a chipset processes particular reminiscence alignment requests, improper validation permits integer values to overflow, corrupting adjoining reminiscence areas.
This sort of flaw can permit menace actors to execute arbitrary code, escalate privileges, or destabilise focused techniques, making it particularly harmful in cellular, embedded, and IoT environments the place Qualcomm chipsets are extensively deployed.
Qualcomm processors energy a whole bunch of tens of millions of Android smartphones, tablets, automotive techniques, and related units globally, which considerably broadens the assault floor for this vulnerability.
| Discipline | Particulars |
|---|---|
| CVE ID | CVE-2026-21385 |
| Vendor/Product | Qualcomm / A number of Chipsets |
| Vulnerability Kind | Reminiscence Corruption |
| CWE | CWE-190 (Integer Overflow or Wraparound) |
| Date Added to KEV | March 03, 2026 |
| Remediation Due Date | March 24, 2026 |
| Ransomware Utilization | Unknown |
| CISA Motion | Apply vendor mitigations or discontinue product use |
CISA’s inclusion of this flaw within the KEV catalog confirms that menace actors are actively exploiting CVE-2026-21385 in real-world assaults.
Whereas ransomware marketing campaign involvement stays unknown at this stage, reminiscence corruption vulnerabilities of this class are incessantly weaponized for privilege escalation, distant code execution chains, and chronic machine compromise.
The broad deployment of Qualcomm chipsets makes this a horny goal for each state-sponsored actors and cybercriminal teams.
Mitigation and Really useful Actions
CISA has mandated that every one Federal Civilian Govt Department (FCEB) companies remediate this vulnerability by March 24, 2026, consistent with Binding Operational Directive (BOD) 22-01.
CISA recommends all organizations take the next steps instantly:
- Apply patches as quickly as Qualcomm releases official mitigations or firmware updates
- Comply with BOD 22-01 steering for cloud-based companies utilizing affected chipsets
- Discontinue use of affected merchandise if no mitigations can be found
- Monitor units working Qualcomm chipsets for anomalous habits or unauthorized reminiscence entry makes an attempt
- Subscribe to CISA KEV catalog updates to remain knowledgeable of newly exploited vulnerabilities
Organizations counting on Qualcomm-powered infrastructure ought to deal with this as a high-priority remediation merchandise given the lively exploitation standing confirmed by CISA.
Comply with us on Google Information, LinkedIn, and X to Get Instantaneous Updates and Set GBH as a Most well-liked Supply in Google.

