🛡️ Security Tools

Pixel 9 Cracked Open: BigWave Driver's Triple Bug Sandbox Escape

Three bugs. Two hours. Pixel 9's BigWave driver hands attackers the keys to kernel town. Google's sandbox? Laughable.

Diagram of Pixel 9 BigWave driver UAF exploit chain from mediacodec sandbox to kernel compromise

⚡ Key Takeaways

  • Three bugs in Pixel 9's BigWave driver enable mediacodec sandbox escape to kernel R/W in hours of auditing.
  • UAF from ioctl timeout races lets attackers control hardware register writes via sprayed allocations.
  • Google delayed fixes over a year on one dupe bug; echoes past Android driver woes, predicting more to come.

🧠 What's your take on this?

Cast your vote and see what Threat Digest readers think

Priya Sundaram
Written by

Priya Sundaram

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.