Pixel 9 0-Click Exploit Chain Issues

A Pixel 9 sits untouched, yet attackers slip in through audio messages. Google's overlooked codecs turn innocent buzzes into full compromises.

Pixel 9 phone displaying incoming audio message with red vulnerability warning overlay

Key Takeaways

  • Dolby UDC and similar codecs bloat Pixel 9's 0-click surface via auto-audio processing.
  • Bugs found in days; full chains in weeks—attackers thrive on overlooked spots.
  • Drivers remain soft targets; AI features risk exploding vulnerabilities without audits.

Your Pixel 9 lights up with a message—audio, transcribed automatically. No click needed. Boom. Owned.

That’s the chilling reality of a 0-click exploit chain for the Pixel 9, as laid bare in Project Zero’s latest salvo. These folks at Google—yeah, Google’s own elite bug hunters—spent weeks chaining nasties like the Dolby UDC codec and BigWave driver bugs into a remote takeover. And they’re not mincing words about the mess.

Audio Messages: The Unseen Doorway

Google Messages transcribes incoming audio before you even glance at it. Smart, right? Except on Pixel 9, another process—com.google.android.tts—jumps in to decode that sound too. Why? Searchability, maybe. Who knows.

Both chew through every decoder on the device. Including Dolby UDC, that OEM-favored oddity for movie audio formats nobody’s sending in texts. Seriously—Android lacks encoders for it. Yet there it sits, primed for exploitation.

Project Zero nails it:

The Dolby UDC is part of the 0-click attack surface of most Android devices because of audio transcription in the Google Messages application. Incoming audio messages are transcribed before a user interacts with the message.

Remove these fringe decoders from the auto-play zone, they say. Duh. But AI features? They’re exploding the attack surface. Every “helpful” transcription or search tweak risks pulling in more code for attackers to poke.

Vendors chase features without a security audit. Sloppy. And users pay.

Why Does Pixel 9’s Attack Surface Feel So Sloppy?

Hackathons. One week, and Ivan bags CVE-2025-54957 in Dolby UDC. Less than two days. Seth? One day on BigWave’s CVE-2025-36934.

Prep work mattered—three weeks tooling up. Still, person-weeks total for a full chain. Nation-states laugh at that timeline.

Android fuzzes codecs via OSS-Fuzz. Good on ya. But Pixel skips UDC? Gaps everywhere. Drivers? Softer than butter. GTIG spotted 16 in-the-wild driver bugs since 2023.

Here’s my hot take, absent from the post: This echoes the iPhone’s 2009-2010 era, when SMS and PDF parsers were playgrounds for jailbreaks. Google dismissed those as ancient history—yet here we are, with audio playing the same fool’s role. Without a full 0-click surface map (and fuzzing it relentlessly), Pixels risk weekly chains from Beijing or Moscow.

Drivers: Android’s Eternal Achilles Heel

BigWave. Just one example. Samsung, Qualcomm, ARM—they patch, sure. But attackers lap ‘em.

Rust rewrites? Security reviews? Less privilege? Updatable drivers? All on the table. Yet urgency lags.

Google’s spinning fuzzing wins, but overlooks OEM silos. PR gloss over real gaps. Classic.

Exploitation time? Eight person-weeks for UDC, three for BigWave POC. Peanuts for pros.

AI Boom, Security Bust?

AI everywhere—transcribe this, search that. Noble. But each feature bloats the unclicked code.

Deliberate reviews? Ha. Software creeps, surfaces swell.

Prediction: By 2026, half of 0-clicks hit via AI hooks. Unless OEMs audit ruthlessly.

Pixels promise top security. Reality? Overlooked codecs beg to differ.

The Fix-It Wishlist

Rigorous attack surface audits. Fuzz everything—UDC included. Strip unused decoders from Messages.

Drivers: Mandate Rust for new ones. Cage ‘em from userland. Auto-updates, stat.

OEMs, wake up. Your Dolby toys aren’t for texts.

Short version? Android’s coasting. Attackers sprint.

And that’s before quantum or next-gen AI vectors.


🧬 Related Insights

Frequently Asked Questions

What causes 0-click exploits on Pixel 9?

Audio transcription in Google Messages auto-decodes files with obscure codecs like Dolby UDC, letting attackers chain bugs remotely—no user action needed.

How long to exploit Pixel 9 vulnerabilities like CVE-2025-54957?

Project Zero clocked person-weeks: eight for the codec, three for the driver POC. Pros do it faster.

Will Google remove Dolby UDC from Pixels?

Unclear—recommendations push stripping it from 0-click paths, but OEM integrations and features complicate it. Patch and audit first.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What causes 0-click exploits on Pixel 9?
Audio transcription in Google Messages auto-decodes files with obscure codecs like Dolby UDC, letting attackers chain bugs remotely—no user action needed.
How long to exploit Pixel 9 vulnerabilities like CVE-2025-54957?
Project Zero clocked person-weeks: eight for the codec, three for the driver POC. Pros do it faster.
Will Google remove Dolby UDC from Pixels?
Unclear—recommendations push stripping it from 0-click paths, but OEM integrations and features complicate it. Patch and audit first.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Google Project Zero

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.