Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Vulnerabilities Patched in Qualcomm, Mediatek Chipsets

Chip makers Qualcomm and Mediatek have released patches for many vulnerabilities across their products.

Qualcomm Mediatek vulnerabilities

Chip makers Qualcomm and Mediatek on Monday announced patches for many vulnerabilities, including five issues that were resolved with the latest Android fixes.

Qualcomm’s March 2025 security bulletin details 14 security defects impacting proprietary software used in tens of chipset models, including seven issues rated ‘critical severity’.

All critical flaws are described as memory corruption issues. According to Qualcomm, six of them impact the Automotive Software platform based on QNX, while the seventh affects Automotive Vehicle Networks.

The company also announced fixes for five high-severity bugs that could lead to information disclosure, denial-of-service (DoS), and memory corruption. Two medium-severity defects were also resolved.

Additionally, the chip maker rolled out fixes for seven high-severity and six medium-severity flaws in open source components.

“Patches are being actively shared with OEMs, who have been notified and strongly recommended to deploy those patches on released devices as soon as possible,” Qualcomm notes.

Advertisement. Scroll to continue reading.

Three of the CVEs, namely CVE-2024-43051, CVE-2024-53011, and CVE-2024-53025, were also addressed with the March 2025 Android update.

Mediatek on Monday published information on 10 vulnerabilities affecting dozens of chipsets. Fixes were released for three high-severity issues, including a memory corruption in modems that could lead to DoS, and two out-of-bounds write bugs in KeyInstall and WLAN that could lead to escalation of privileges.

Patches for the modem and KeyInstall flaws, tracked as CVE-2025-20644 and CVE-2025-20645, were also included in this month’s Android updates.

The remaining seven issues that Mediatek resolved this month are medium-severity bugs that could lead to DoS, information disclosure, and escalation of privilege.

According to the company, “device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.”

Neither Qualcomm nor Mediatek mentioned any of these vulnerabilities being exploited in the wild.

Related: Qualcomm Extends Security Support for Android Devices to 8 Years

Related: Qualcomm Alerted to Possible Zero-Day Exploited in Targeted Attacks

Related: AI Data Exposed to ‘LeftoverLocals’ Attack via Vulnerable AMD, Apple, Qualcomm GPUs

Related: ‘5Ghoul’ Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.