TL;DR

Research uncovered a series of vulnerabilities in the Pixel 9's BigWave AV1 decoding hardware that allow privilege escalation from userland to kernel level.

What happened

['Discovered potential RCE exploit in Dolby Unified Decoder', 'Identified accessible Linux kernel drivers from mediacodec context', 'Found /dev/bigwave driver exploitable for privilege escalation']

Why it matters for ops

['Critical hardware components like BigWave are common attack vectors', 'Exploits can allow full access to the system, undermining security']

Mitigation

  • Apply OS updates addressing the BigWave driver vulnerabilities
  • Implement strict security policies for hardware device drivers

Action items

  • Review system logs for signs of unauthorized /dev/bigwave access
  • Update to latest firmware and patches for Pixel 9 devices

Detection IOCs

  • /dev/bigwave access from mediacodec context
  • Unusual process-to-kernel communication patterns

Source link

https://projectzero.google/2026/01/pixel-0-click-part-2.html