Executive Summary
In January 2026, Google Pixel 9 devices were found vulnerable to a sophisticated zero-click exploit chain targeting the Android BigWave hardware driver. Attackers combined a remote code execution exploit affecting a Dolby decoder with a privilege escalation flaw in the /dev/bigwave device, accessible from the mediacodec SELinux sandbox. The chain allowed attackers to escape the sandbox, bypass SELinux protections, and achieve kernel-level arbitrary read/write, essentially gaining full device control. This exploit enabled unauthorized access to sensitive data and even allowed remote data exfiltration by attackers, severely compromising device security.
This incident highlights the increasing sophistication of exploit chains leveraging hardware-specific drivers and sandbox escape techniques in mobile ecosystems. With the rise in supply chain threats, use of AI to automate exploit engineering, and growing pressure from privacy regulators, organizations face escalating risks from zero-day attacks targeting embedded devices.
Why This Matters Now
Hardware driver vulnerabilities with sandbox escape techniques are rapidly becoming preferred targets for advanced threat actors, and the integration of generative AI in exploit development is accelerating attack timelines. The Pixel 9 incident underscores the urgency for stronger security controls, faster patch mechanisms, and enhanced threat detection on mobile endpoints.
Attack Path Analysis
An attacker exploited a 0-click Dolby Unified Decoder RCE vulnerability to gain an initial foothold within the mediacodec sandbox. They then abused multiple vulnerabilities in the BigWave kernel driver to escalate privileges, gaining kernel arbitrary read/write and ultimately root access. Leveraging this control, the attacker bypassed SELinux restrictions, pivoted horizontally to manipulate other userspace and system resources, and enabled command-and-control capability. Data was exfiltrated by scripting command sequences that captured sensitive content and sent it to an external IP via outbound connections. Finally, the attacker achieved impact by disabling SELinux, modifying kernel states, and establishing persistent root-level compromise.
Kill Chain Progression
Initial Compromise
Description
The attacker leveraged a Dolby Unified Decoder remote code execution vulnerability (0-click) to gain initial access in an unprivileged mediacodec SELinux sandbox.
Related CVEs
CVE-2025-54957
CVSS 8.8An integer overflow vulnerability in the Dolby Digital Plus audio decoder allows remote attackers to execute arbitrary code via crafted EMDF payloads.
Affected Products:
Dolby Laboratories Dolby Digital Plus Decoder – All versions prior to January 5, 2026
Exploit Status:
exploited in the wildCVE-2025-36934
CVSS 7.8A use-after-free vulnerability in the BigWave driver on Pixel 9 devices allows local attackers to escalate privileges to kernel level.
Affected Products:
Google Pixel 9 – All versions prior to January 5, 2026
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
This MITRE ATT&CK mapping reflects observed privilege escalation, sandbox escape, and OS kernel exploitation, and may evolve with further technical enrichment.
Exploitation for Privilege Escalation
Exploitation for Client Execution
Exploitation for Defense Evasion
Event Triggered Execution: OS Kernel or Module Compromise
OS Credential Dumping: DUMP_CREDENTIALS
Indicator Removal on Host: File Deletion
Resource Hijacking
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS v4.0 – Security Testing of System Components
Control ID: 6.2.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Digital Operational Resilience Act) – ICT System Resilience and Security
Control ID: Art. 9(2)
CISA Zero Trust Maturity Model 2.0 – Endpoint Security and Least Privilege Enforcement
Control ID: Device Pillar: Prevent Unauthorized Device Access
NIS2 Directive – Vulnerability Handling and Disclosure
Control ID: Art. 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Zero-day exploit chains targeting mobile devices create critical vulnerabilities in network infrastructure, requiring enhanced east-west traffic security and threat detection capabilities.
Computer Software/Engineering
Android kernel driver exploits demonstrate urgent need for secure coding practices, zero trust segmentation, and comprehensive vulnerability management in software development lifecycles.
Computer/Network Security
Advanced 0-click exploit chains bypassing KASLR and SELinux showcase evolving threat landscape requiring enhanced inline IPS capabilities and anomaly detection systems.
Defense/Space
Sophisticated mobile device exploitation techniques pose significant risks to classified communications, demanding robust encrypted traffic solutions and multicloud visibility controls.
Sources
- A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wavehttps://projectzero.google/2026/01/pixel-0-click-part-2.htmlVerified
- Google Project Zero Reveals Sophisticated Zero-Click Exploit Chain Targeting Pixel 9https://cyberpress.org/project-zero-zero-click-exploit-pixel-9/Verified
- A 0-click exploit chain for the Pixel 9 Part 3: Where do we go from here?https://projectzero.google/2026/01/pixel-0-click-part-3.htmlVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, microsegmentation, east-west security, and strict egress controls would have constrained privilege escalation, lateral movement, and prevented data exfiltration. Policy enforcement, traffic visibility, and inline detection would have enabled rapid threat discovery and containment of the attacker’s activities throughout the kill chain.
Control: Threat Detection & Anomaly Response
Mitigation: Detects anomalous process activity and RCE signatures for early alerting.
Control: Zero Trust Segmentation
Mitigation: Blocks unauthorized privilege escalation and sandbox escapes using least-privilege network and workload policies.
Control: East-West Traffic Security
Mitigation: Limits internal pivoting and restricts unauthorized workload-to-workload communication.
Control: Egress Security & Policy Enforcement
Mitigation: Policy-based filtering detects or blocks unsanctioned C2 or outbound access.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents data exfiltration by blocking or restricting outbound network traffic to unapproved destinations.
Rapid detection and centralized visibility accelerate incident response to contain system impact.
Impact at a Glance
Affected Business Functions
- Mobile Communications
- Data Security
Estimated downtime: 7 days
Estimated loss: $5,000,000
Potential exposure of sensitive user data, including personal communications and authentication credentials, due to unauthorized access facilitated by the exploit chain.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust Segmentation to limit process and workload interactions, even within the same host or cloud context.
- • Apply least-privilege access policies and microsegmentation to sensitive kernel interfaces and internal device drivers.
- • Implement strict egress filtering to prevent unauthorized outbound network connections and data exfiltration.
- • Deploy real-time threat and anomaly detection to rapidly identify suspicious process, memory, or network activity.
- • Ensure centralized visibility across workloads and automate policy enforcement to speed up incident response to privilege escalation and lateral movement.

