<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Chips&amp;Media — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/chipsmedia/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 17:21:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/chipsmedia/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pixel 10 Zero-Click Exploit Chain via Dolby and VPU Driver Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-05-pixel-10-zero-click/</link><pubDate>Wed, 13 May 2026 17:21:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pixel-10-zero-click/</guid><description>A zero-click exploit chain was developed for the Google Pixel 10, achieving root access on Android by exploiting a patched Dolby vulnerability (CVE-2025-54957) and a memory mapping vulnerability in the Chips&amp;Media Wave677DV video processing unit (VPU) driver.</description><content:encoded><![CDATA[<p>Project Zero researchers developed a zero-click exploit chain for the Google Pixel 10, building upon their previous work on the Pixel 9. The exploit chain leverages two key vulnerabilities: an updated exploit for CVE-2025-54957 (a Dolby vulnerability patched in January 2026) and a newly discovered memory mapping vulnerability in the Chips&amp;Media Wave677DV video processing unit (VPU) driver found at /dev/vpu on the Tensor G5 chip. The VPU driver vulnerability allows for arbitrary read/write access to the kernel, leading to complete device compromise. This research highlights the critical need for robust security practices in Android driver development and the importance of rapid patching for newly discovered vulnerabilities. The updated Dolby UDC exploit is effective only on unpatched devices with a security patch level of December 2025 or earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted media file to the target device, leveraging the Dolby vulnerability (CVE-2025-54957).</li>
<li>The crafted media file triggers a vulnerability in the Dolby decoder, allowing code execution in the context of the media process.</li>
<li>The exploit overwrites <code>dap_cpdp_init</code> in the Dolby library to redirect control flow.</li>
<li>The attacker gains initial code execution, but limited privileges.</li>
<li>The attacker interacts with the <code>/dev/vpu</code> device driver for the Chips&amp;Media Wave677DV VPU.</li>
<li>The attacker exploits the <code>vpu_mmap</code> function to map the VPU&rsquo;s MMIO register region into userland, specifying a size larger than the register region.</li>
<li>This allows the attacker to map arbitrary physical memory, including the kernel image, into userland.</li>
<li>The attacker overwrites kernel functions with malicious code, gaining kernel code execution and root privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this chain grants the attacker complete control over the targeted Google Pixel 10 device. This includes the ability to access sensitive user data, install malicious applications, and perform any action with root privileges. Given the zero-click nature of the initial vulnerability, a large number of devices could be compromised without user interaction. The affected sector is mobile devices.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential exploitation attempts targeting the VPU driver.</li>
<li>Monitor for unexpected memory mappings involving the <code>/dev/vpu</code> device, as indicated by the successful exploitation in the Attack Chain (log source: process_creation).</li>
<li>While CVE-2025-54957 is patched, monitor for older devices potentially vulnerable to the Dolby exploit, as described in the Overview.</li>
<li>Review kernel driver code, particularly memory mapping functions, for similar vulnerabilities as described in &ldquo;The Holy Grail of Kernel Vulnerabilities&rdquo; to prevent future exploits.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>android</category><category>zero-click</category><category>privilege-escalation</category><category>kernel-exploit</category></item></channel></rss>