• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Android

Major MediaTek security flaw could expose data on millions of Android phones

March 12, 2026
Share on FacebookShare on Twitter

Ryan Haines / Android Authority

TL;DR

  • Security researchers from Ledger’s Donjon team discovered a vulnerability in MediaTek-powered Android phones that allowed them to break into the CMF Phone 1 by Nothing in just 45 seconds.
  • The exploit reportedly worked without even booting Android, allowing the researchers to recover the phone’s PIN, decrypt its storage, and extract crypto wallet data.
  • MediaTek says it issued a fix to device makers in January 2026, but the flaw could potentially affect millions of Android devices.

Security researchers have discovered a serious vulnerability in MediaTek-powered Android phones that could allow attackers to extract sensitive user data even when the device is powered off.

Don’t want to miss the best from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

The flaw was uncovered by Donjon, the hardware security research team run by crypto hardware wallet company Ledger. According to Ledger CTO Charles Guillemet’s posts on X, the vulnerability could affect millions of Android devices with MediaTek processors that use Trustonic’s Trusted Execution Environment (TEE).

Guillemet said the team used the CMF Phone 1 by Nothing to demonstrate the exploit and managed to gain access to the phone’s protected data in less than a minute.

“The Ledger Donjon plugged a CMF Phone 1 into a laptop and breached the phone’s foundational security within 45 seconds,” he wrote.

Donjon MediaTek Post X

According to the researchers, the exploit works without ever booting the Android operating system. Once the phone is connected to a computer, the attack can automatically retrieve the device’s PIN, decrypt its storage, and extract seed phrases from popular software cryptocurrency wallets.

These seed phrases are essentially the master keys used to recover crypto wallets, making them extremely valuable targets for attackers.

Many MediaTek devices rely on a Trusted Execution Environment (TEE), a secure area inside the main processor, to protect sensitive data. The TEE is protected through software isolation and hardware privileges, but it’s still very much a part of the main chip.

In contrast, Pixel phones, iPhones, and many Snapdragon devices use dedicated hardware security processors such as the Titan M2, Secure Enclave, or the Qualcomm Secure Processing Unit to keep sensitive information isolated from the main chip.

Guillemet said the issue highlights a deeper design problem with many consumer devices.

“General-purpose chips are built for convenience,” he explained. “Secure Elements are built for key protection.”

Unlike typical smartphone chips, dedicated Secure Elements isolate sensitive secrets from the rest of the system. According to Ledger, this separation helps protect the hardware from physical attacks.

Fixes have already been issued

The vulnerability found in MediaTek chips has been assigned the identifier CVE-2026-20435. The Donjon team says it followed a responsible disclosure process and informed MediaTek before making the vulnerability public.

MediaTek confirmed to the security research firm that it provided fixes to device manufacturers on January 5, 2026, meaning the vulnerability should be patched in software updates from affected phone makers.

This isn’t the first time Ledger’s research group has uncovered security weaknesses in MediaTek hardware.

However, it’s unclear if the vulnerability has been exploited by attackers and its potential impact on existing devices. MediaTek chips power millions of devices across multiple price tiers.

Affected MediaTek Chips

The chipmaker’s March security bulletin lists the affected processors, including those powering entry-level to flagship phones from the likes of OPPO, vivo, OnePlus, and Samsung. You can compare the model names and check online whether your phone features one of the affected chipsets, though patches for the flaw should already be available or be coming soon from your phone maker.

This isn’t the first time Ledger’s research group has uncovered security weaknesses in MediaTek hardware. Last year, the Donjon team discovered fault injection vulnerabilities in the MediaTek Dimensity 7300 chipset, resulting in a complete security compromise.

At the time, MediaTek responded by saying such attacks fall outside the intended threat model for the chipset.

Thank you for being part of our community. Read our Comment Policy before posting.

Next Post

Fatal Frame II: Crimson Butterfly Remake Review [Capsule Computers]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • NYT Pips hints, answers for March 12, 2026
  • iPhone 17e vs. Google Pixel 10a: Two affordable flagships, one tough decision
  • Today’s Hurdle hints and answers for March 12, 2026
  • NYT Connections Sports Edition hints and answers for March 12: Tips to solve Connections #535
  • Fatal Frame II: Crimson Butterfly Remake Review [Capsule Computers]

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously