A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave
infonews
security
Source: Google Project ZeroJanuary 14, 2026
Summary
A researcher discovered three bugs in the BigWave driver on Pixel 9 phones, including one that allows escaping the mediacodec sandbox (a restricted environment where apps run with limited permissions) to gain kernel arbitrary read/write access. The most dangerous bug is a use-after-free vulnerability (accessing memory that has already been freed), which occurs when a worker thread continues processing a job after the file descriptor managing it has been closed and its memory destroyed.
Solution / Mitigation
Fixes were made available for all three bugs on January 5, 2026.
Classification
Attack SophisticationAdvanced
Original source: https://projectzero.google/2026/01/pixel-0-click-part-2.html
First tracked: February 12, 2026 at 02:28 PM
Classified by LLM (prompt v3) · confidence: 95%