🛡️ Security Tools

Pixel 9 Cracked Open: BigWave Driver's Triple Bug Sandbox Escape

Three bugs. Two hours. Pixel 9's BigWave driver hands attackers the keys to kernel town. Google's sandbox? Laughable.

Diagram of Pixel 9 BigWave driver UAF exploit chain from mediacodec sandbox to kernel compromise

⚡ Key Takeaways

  • Three bugs in Pixel 9's BigWave driver enable mediacodec sandbox escape to kernel R/W in hours of auditing. 𝕏
  • UAF from ioctl timeout races lets attackers control hardware register writes via sprayed allocations. 𝕏
  • Google delayed fixes over a year on one dupe bug; echoes past Android driver woes, predicting more to come. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.