🛡️ Security Tools

Pixel 9's Silent Killer: 0-Click Exploits via Obscure Audio Codecs

A Pixel 9 sits untouched, yet attackers slip in through audio messages. Google's overlooked codecs turn innocent buzzes into full compromises.

Pixel 9 phone displaying incoming audio message with red vulnerability warning overlay

⚡ Key Takeaways

  • Dolby UDC and similar codecs bloat Pixel 9's 0-click surface via auto-audio processing.
  • Bugs found in days; full chains in weeks—attackers thrive on overlooked spots.
  • Drivers remain soft targets; AI features risk exploding vulnerabilities without audits.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

Sarah Chen
Written by

Sarah Chen

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.