[!(https://thehackernews.com/images/-fZV9AOkLFZw/YFl4ojMBVdI/AAAAAAAACFY/lDGhJ2azIxIuCePPX34BZU4H_0mtmSfrgCLcBGAsYHQ/s0/android-adb-hack.png)](<https://thehackernews.com/images/-fZV9AOkLFZw/YFl4ojMBVdI/AAAAAAAACFY/lDGhJ2azIxIuCePPX34BZU4H_0mtmSfrgCLcBGAsYHQ/s0/android-adb-hack.png>) Google has disclosed that a now-patched vulnerability affecting Android devices that use Qualcomm chipsets is being weaponized by adversaries to launch targeted attacks. Tracked as **CVE-2020-11261** (CVSS score 8.4), the flaw [concerns](<https://www.qualcomm.com/company/product-security/bulletins/january-2021-bulletin>) an "improper input validation" issue in Qualcomm's Graphics component that could be exploited to trigger memory corruption when an attacker-engineered app requests access to a huge chunk of the device's memory. "There are indications that CVE-2020-11261 may be under limited, targeted exploitation," the search giant [said](<https://source.android.com/security/bulletin/2021-01-01>) in an updated January security bulletin on March 18. CVE-2020-11261 was discovered and reported to Qualcomm by Google's Android Security team on July 20, 2020, after which it was fixed in January 2021. [!(https://thehackernews.com/images/-hngRw5Tf0vA/YFl3-qMvHtI/AAAAAAAACFQ/DZiVZPyGy7gyqDc233jO0YbxnggQbhdrwCLcBGAsYHQ/s0/android.jpg)](<https://thehackernews.com/images/-hngRw5Tf0vA/YFl3-qMvHtI/AAAAAAAACFQ/DZiVZPyGy7gyqDc233jO0YbxnggQbhdrwCLcBGAsYHQ/s0/android.jpg>) It's worth noting that the access vector for the vulnerability is "local," meaning that exploitation requires local access to the device. In other words, to launch a successful attack, the bad actor must either have physical access to the vulnerable smartphone or use other means - e.g., a [watering hole](<https://en.wikipedia.org/wiki/Watering_hole_attack>) \- to deliver malicious code and set off the attack chain. While specifics about the attacks, the identity of the attacker, and the targeted victims have not been released, it is not unusual for Google to withhold sharing such information to prevent other threat actors from taking advantage of the vulnerability. If anything, the development once again underscores the need to promptly install monthly security updates as soon as they are available to prevent Android devices from being exploited. We've reached out to Google for comment and will update this article if we hear back. Found this article interesting? Follow THN on [Facebook](<https://www.facebook.com/thehackernews>), [Twitter __](<https://twitter.com/thehackersnews>) and [LinkedIn](<https://www.linkedin.com/company/thehackernews/>) to read more exclusive content we post.
Qualcomm Multiple Chipsets Improper Input Validation Vulnerability
4 Android Bugs Being Exploited in the Wild
Google Warns of New Android 0-Day Vulnerability Under Active Targeted Attacks
Android Security Bulletin—January 2021
The More You Know, The More You Know You Don’t Know