Back

Zero-Click Exploit Chain Discovered for Google Pixel 10

Severity: High (Score: 71.0)

Sources: Blogger, Gbhackers

Summary

A zero-click exploit chain for the Google Pixel 10 has been detailed, allowing attackers to gain full kernel control via a vulnerable video processing driver. This exploit builds on the previously identified Dolby 0-click vulnerability (CVE-2025-54957), which was patched in January 2026. The exploit takes advantage of a driver that exposes hardware interfaces directly to userspace, permitting attackers to map physical memory into userland. The vulnerability affects unpatched Pixel 10 devices running software prior to the December 2025 security patch. The exploit chain demonstrates how quickly Google can patch critical issues, while also highlighting risks posed by vendor driver mistakes. The exploit is currently available for use against vulnerable devices. Key Points: • A zero-click exploit chain for Pixel 10 allows full kernel control via a video driver vulnerability. • The exploit builds on the previously patched Dolby vulnerability (CVE-2025-54957). • Unpatched Pixel 10 devices running software prior to December 2025 are at risk.

Key Entities

  • Zero-day Exploit (attack_type)
  • CVE-2025-54957 (cve)
  • Cwe-125 - Out-of-bounds Read (cwe)
  • Cwe-787 - Out-of-bounds Write (cwe)
  • T1068 - Exploitation for Privilege Escalation (mitre_attack)
  • Android (platform)
  • Linux (platform)
  • Dolby 0-click Vulnerability (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed