Categories: Cyber Security News

Google Project Zero Reveals Zero-Click Exploit Chain for Pixel 10

Google Project Zero researchers have uncovered a full zero-click exploit chain targeting Pixel 10 devices, demonstrating how a remote audio decoding bug can escalate all the way to complete kernel control through a single vulnerable video driver.

The chain begins with CVE-2025-54957, a critical flaw in the Dolby Unified Decoder (UDC) that was previously used against Pixel 9 devices.

When a target receives a crafted Dolby Digital Plus (DD+) audio stream via a voice message or audio attachment, the device processes it automatically, with zero interaction required. This turns ordinary media files into silent attack vectors.

Updated Exploit Bypasses Pixel 10 Protections

For Pixel 10, Project Zero researcher Seth Jenkins adapted the existing Dolby UDC exploit by recalculating offsets for the updated library build.

The main obstacle was Pixel 10’s switch from classic stack-protector to return address pointer authentication (RET PAC), which eliminated the previous __stack_chk_fail overwrite primitive.

Jenkins worked around this by targeting dap_cpdp_initAn initialization function that runs only once can be safely overwritten and does not affect normal decoding afterward.

This updated exploit works only on devices that haven’t applied the December 2025 or January 2026 Android security patches.

On Pixel 9, the second exploit stage relied on a BigWave AV1 driver bug. Pixel 10 dropped that driver but introduced a new one /dev/vpu driver for the Chips&Media Wave677DV block on the Tensor G5 chip.

The same development team behind BigWave maintains this driver, making it a natural audit target.

In just two hours, Jenkins and colleague Jann Horn found a critical flaw in the VPU mmap handler.

The vulnerable code maps VPU physical memory to the user space, but never validates the requested mapping size:

cstatic int vpu_mmap(struct file *fp, struct vm_area_struct *vm)
{
    unsigned long pfn;
    struct vpu_core *core =
        container_of(fp->f_inode->i_cdev, struct vpu_core, cdev);
    vm_flags_set(vm, VM_IO | VM_DONTEXPAND | VM_DONTDUMP);
    vm->vm_page_prot = pgprot_device(vm->vm_page_prot);
    pfn = core->paddr >> PAGE_SHIFT;
    return remap_pfn_range(vm, vm->vm_start, pfn,
                           vm->vm_end - vm->vm_start,
                           vm->vm_page_prot) ? -EAGAIN : 0;
}

Because remap_pfn_range uses only the VMA length without bounds checking, an attacker can pass an oversized mapping that extends well beyond the VPU registers, pulling in arbitrary physical memory, including the entire kernel image.

Since Pixel 10 places the kernel at a fixed physical address, no KASLR bruteforcing is needed. Project Zero built an arbitrary kernel read-write primitive in just five lines of code, completing a full exploit in under a day.

Jenkins reported the VPU bug on November 24, 2025. Google shipped a fix 71 days later in the February Pixel security bulletin, the first time one of Jenkins’ Android driver bugs was patched in under 90 days, reflecting measurable improvement in Google’s triage pipeline.

Still, the research highlights a persistent problem: shallow, easily discoverable vulnerabilities continue to exist in vendor-maintained kernel drivers.

Project Zero urges OEMs to invest in systematic secure coding practices and proactive driver audits before such chains ever reach end users.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Google Project Zero Reveals Zero-Click Exploit Chain for Pixel 10 appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Amazon Launches Its Memorial Day Sale a Full Week Earlier Than Expected

Memorial Day weekend isn't this weekend; it's next weekend. But that hasn't stopped Amazon from…

7 minutes ago

NFL’s Los Angeles Chargers Reveal 2026 Schedule Using Halo

NFL teams have been coming up with creative ways to announce their season schedules in…

7 minutes ago

Warhammer 40,000’s Most Famous Player, Henry Cavill, Presented With a Gift Fit for the Emperor Himself While Filming Highlander in Poland

No matter where Henry Cavill goes, Warhammer 40,000 seems to follow. The former Superman actor,…

8 minutes ago

Save Nearly $200 off Steelseries’ Flagship Arctis Nova Elite Wireless Gaming Headset

Steelseries' flagship headset is the Arctis Nova Elite, which should be obvious from the $600…

8 minutes ago

The Powerful AMD Radeon 9070 XT Graphics Card Drops to $680 During Amazon’s Early Memorial Day Sale

Similar to every other high-end GPU on the market, the AMD Radeon 9070 XT graphics…

1 hour ago

Best Buy Is Offering Great Discounts on a Selection of Switch and Switch 2 Games Right Now

Best Buy has dropped some great deals on select games for Nintendo Switch and Nintendo…

1 hour ago

This website uses cookies.