VulnerabilitiesHIGH

Exploit Uncovered: Pixel 9's BigWave Driver Vulnerability

GPGoogle Project ZeroJan 14, 2026
Pixel 9BigWave drivervulnerability0-click exploitRCE
🎯

Basically, a new bug in Pixel 9's software could let hackers take control.

Quick Summary

A serious vulnerability has been found in the Pixel 9's BigWave driver. This flaw could allow hackers to take control of your device without any user interaction. It's crucial for users to update their devices immediately to protect their personal data.

What Happened

A significant vulnerability has been discovered in the Pixel 9's BigWave driver?, which could allow hackers to gain control over the device. This exploit is particularly alarming because it can be triggered without any user interaction, known as a 0-click exploit. Researchers found that the driver, responsible for accelerating video decoding tasks, had multiple bugs that could be exploited to escape the sandboxed? environment intended to keep it secure.

Using a tool called DriverCartographer, the researcher identified that the BigWave driver? was accessible from a restricted context called mediacodec?. This context is designed to limit access to sensitive system resources, but the flaws in the driver reveal that it can be manipulated. After auditing the code, three bugs were found, with one being powerful enough to allow arbitrary read and write access at the kernel? level, effectively breaking the security model of the Pixel 9.

The first bug was a previously reported issue that had not been fixed for over a year. The second bug introduced a new class of vulnerabilities, but it was the third bug that posed the most significant risk. This bug allowed for a scenario where a job submitted to the BigWave hardware could be processed even after the associated file descriptor? was closed, leading to potential unauthorized access to sensitive data.

Why Should You Care

If you own a Pixel 9, this vulnerability could put your personal data at risk. Imagine leaving your front door unlocked while you sleep — that’s how this exploit works. A hacker could potentially access your device without you even knowing it, stealing private information or manipulating apps without your consent.

This is not just a technical issue; it affects your everyday life. Your phone stores sensitive information like banking details, personal messages, and photos. If a hacker can exploit this vulnerability, they could access all of that without any warning. It’s crucial to stay informed and take necessary precautions to protect your data.

What's Being Done

The good news is that the developers have responded to these vulnerabilities. Fixes for all three bugs were released on January 5, 2026. If you’re a Pixel 9 user, here’s what you should do right now:

  • Update your device to the latest software version immediately.
  • Monitor your device for any unusual behavior.
  • Consider changing passwords for sensitive accounts as a precaution. Experts are keeping a close eye on how quickly users adopt the updates and whether any new exploits emerge in the wild. The landscape of mobile security is constantly evolving, and staying ahead is essential for your safety.

💡 Tap dotted terms for explanations

🔒 Pro insight: The discovery of a 0-click exploit in a widely used driver highlights the ongoing risks in mobile security and the need for robust patch management.

Original article from

Google Project Zero

Read Full Article

Related Pings

HIGHVulnerabilities

Authentication Bypass Flaw Exposes pac4j-jwt Users

A critical vulnerability in the pac4j-jwt library allows attackers to impersonate users. Developers using this library must update immediately to prevent unauthorized access. Ignoring this could lead to severe security breaches.

Arctic Wolf Blog·Yesterday, 8:34 PM
CRITICALVulnerabilities

Critical Authentication Bypass in pac4j-jwt Library Exposed!

A severe flaw in the pac4j-jwt library allows hackers to bypass authentication. This affects applications relying on the library, risking user data and security. Immediate updates are essential to protect against exploitation.

Arctic Wolf Blog·Yesterday, 7:55 PM
HIGHVulnerabilities

Firefox Faces 22 Vulnerabilities Discovered by Anthropic

Anthropic discovered 22 vulnerabilities in Firefox, with 14 marked high-severity. This puts users at risk of data breaches and unauthorized access. Mozilla is working on patches to fix these issues.

TechCrunch Security·Yesterday, 7:00 PM
CRITICALVulnerabilities

Cisco FMC Faces Maximum-Severity Vulnerabilities: Act Now!

Cisco has identified two critical vulnerabilities in its Secure Firewall Management Center software. Organizations using this software are at risk of unauthorized access and control. Immediate patching is essential to protect sensitive data and maintain security.

Arctic Wolf Blog·Yesterday, 5:58 PM
HIGHVulnerabilities

Firefox Vulnerabilities Exposed by AI in Just Two Weeks

AI has uncovered 22 vulnerabilities in Firefox in just two weeks. This affects anyone using the browser, putting personal data at risk. Mozilla is working on patches to fix these issues, so stay updated!

Cyber Security News·Yesterday, 5:38 PM
HIGHVulnerabilities

Linux Rootkits Evolve with eBPF and io_uring Threats

Linux rootkits are evolving into a serious threat, targeting cloud and IoT systems. This shift puts many users at risk of data breaches and disruptions. Experts are working on detection methods and patches to combat these threats.

Cyber Security News·Yesterday, 5:33 PM