Pixel 9 零点击漏洞链突破内核
嗯,用户让我用中文帮他总结一篇文章,控制在100字以内,而且不需要特定的开头。看起来他可能需要快速了解文章内容,可能是在准备报告或者学习相关知识。 首先,我得通读文章,抓住主要信息。文章讲的是Google Project Zero团队发现了一种针对Google Pixel 9的零点击攻击链。这种攻击利用了音频解码器和硬件驱动中的漏洞,可以在用户不采取任何行动的情况下远程执行代码,最终控制内核。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖攻击链的来源、影响以及修复情况。同时,要避免使用复杂的术语,让总结更易理解。 最后,检查字数是否符合要求,并确保信息准确无误。这样用户就能快速获取文章的核心内容了。 </think> Google Project Zero团队披露了一种针对Google Pixel 9的零点击攻击链,利用音频解码器和硬件驱动漏洞,在用户未采取任何操作的情况下实现远程代码执行并最终控制设备内核。该漏洞已通过2026年1月的安全更新修复。 2026-1-19 10:19:20 Author: securityonline.info(查看原文) 阅读量:0 收藏

One need not even open a missive or engage the “play” interface for a device to commence the background parsing of an attachment, all in the service of providing a seamless transcription or indexing for future retrieval. While ostensibly convenient, such automated functionalities inadvertently transmute mundane correspondence into a sophisticated attack surface. In this digital landscape, a transgressor often requires nothing more than the transmission of a meticulously crafted file.

Researchers from Google Project Zero have meticulously delineated a comprehensive “zero-click” exploit chain targeting the Google Pixel 9, spanning from remote code execution during media decoding to the ultimate compromise of the kernel. This three-part exposé illustrates how vulnerabilities in audio processing and hardware drivers can be coalesced into a scenario where the victim is spared from performing any action whatsoever. Project Zero notes that remediations for the vulnerabilities comprising this chain were integrated into the security updates disseminated on January 5, 2026.

The pivotal shift in recent years lies in the propensity of “intelligent” smartphone features to preemptively analyze the content of incoming messages. Specifically, Google Messages may autonomously decode audio attachments received via SMS and RCS to facilitate transcription without user intervention. Consequently, audio decoders—including those utilized only sporadically—emerge as high-risk zero-click vectors across a vast plurality of Android devices.

The initial stage of this chain involves the Dolby Unified Decoder (UDC), a library for Dolby Digital and Dolby Digital Plus (AC-3 and EAC-3) frequently embedded within manufacturer firmware. Project Zero demonstrates how a vulnerability designated as CVE-2025-54957, residing in the processing of metadata (EMDF), facilitates memory corruption. This breach culminates in code execution within the mediacodec context—a supposedly isolated process dedicated to media decoding on the Pixel 9.

However, the “sandbox” surrounding the media decoder does not necessarily halt the incursion. In the second installment of their findings, Project Zero describes how they traversed from the mediacodec environment to the /dev/bigwave driver—responsible for AV1 acceleration on the Pixel chipset. By exploiting CVE-2025-36934, they successfully bypassed existing restrictions to obtain kernel-level primitives.

Beyond the technical virtuosity, the researchers emphasized the “economics” of the assault. They estimate that developing the Dolby-based exploit required approximately eight man-weeks, while the driver-specific proof-of-concept demanded roughly three. Notably, this chain relied upon a mere pair of defects rather than a convoluted sequence of errors; thus, in practice, the security of the device hinges predominantly upon the velocity with which the ecosystem delivers patches to the end-user.

In the final segment, Project Zero highlights troubling discrepancies in remediation timelines. The UDC vulnerability was disclosed to Dolby on June 26, 2025, with public revelation occurring on October 15, 2025. While Samsung reportedly deployed a patch by November 12, 2025, the Pixel received its update only on January 5, 2026. This implies the flaw remained public and unresolved on Pixel devices for dozens of days. Accelerating updates for third-party components like UDC remains complex, as the library is not integrated into system-level update mechanisms such as APEX.

The pragmatic conclusion for owners of the Pixel 9 and other Android smartphones is as pedestrian as it is vital: verify the installation of the January 2026 security updates and ensure all applications involved in message and media processing are current. Furthermore, platform developers must exercise greater vigilance regarding how nascent “intelligent” features inadvertently expand the zero-click attack surface, while striving to minimize the repertoire of decoders and drivers accessible from remotely reachable contexts.

Related Posts:


文章来源: https://securityonline.info/the-pixel-9-zero-click-exploit-chain-that-breaks-the-kernel/
如有侵权请联系:admin#unsafe.sh