background

Critical Security Flaw Exposes Millions of MediaTek-Powered Android Phones

The vulnerability has been acknowledged and fixes have been issued by MediaTek

Abubakar Mohammed profile pictureby Abubakar Mohammed
Link Copied
copy link iconcopy link icon
MediaTek Dimensity Chipset illustration

Image Credit: MediaTek

Summary

  • Ledger's Donjon security team discovered a critical boot chain flaw CVE-2026-20435 in MediaTek's TEE.
  • Researchers could extract device PIN and storage encryption keys by connecting to a laptop via USB in under 45 seconds.
  • MediaTek officially distributed software patches to smartphone manufacturers.
Click Here to Add Beebom Gadgets As A Trusted SourceGoogleAdd as a preferred source on Google

A severe security vulnerability affecting millions of MediaTek-powered Android smartphones was just discovered. It allowed attackers to bypass fundamental protections and extract highly-sensitive data in under a minute. Although it has now been fixed, it still leaves Android phones at risk until manufacturers update their smartphones.

The flaw was tested on a CMF Phone 1

Discovered by Donjon, the hardware security research team at cryptocurrency wallet manufacturer Ledger, the vulnerability is called the Critical Boot Chain Flaw and is tracked as CVE-2026-20435. It targets MediaTek processors that use Trustonic's Trusted Execution Environment, which acts like a private vault for the processor.

CMF phone 1 in orange colourway from the back
Image Credit: Beebom Gadgets
CMF phone 1 in orange colourway from the back
Image Credit: Beebom Gadgets

The exploit was tested by connecting a CMF Phone 1 to a laptop. In just 45 seconds, researchers could bypass the phone's security without even booting into Android. This includes successful retrieval of the device's PIN, storage decryption and extraction of cryptocurrency wallet seed phrases.

Ledger's CTO, Charles Guillmet, said on X that this vulnerability exposes a design issue in most smartphones, which makes them unfit for storing sensitive information and as secure vaults. TEE is used by most MediaTek chipsets, and they function using software isolation with the main processor to protect the data.

Charles with Donjon MediaTek vulnerability information
Charles with Donjon MediaTek vulnerability information

Compared to Pixels and iPhones, which have their own dedicated chips like the Titan M2 or the upcoming Titan M3 and Secure Enclave, the combination of software and on-SoC security is just not enough to protect secrets from direct physical attacks.

The team at Donjon reported the flaw to MediaTek, and the chip maker acknowledged it in its March 2026 security bulletin. According to MediaTek, the vulnerability affects a wide range of processors, from budget to mid-range and even flagship devices from Samsung to OnePlus, Oppo and Vivo. The brand confirmed it had already issued patches to fix the vulnerability on January 5, 2026.

However, the work to deliver these fixes is entirely up to the manufacturers. Until firmware upgrades are pushed to smartphones, users will be exposed to physical attacks. Users owning MediaTek smartphones are advised to update their smartphones as soon as possible.

Abubakar Mohammed profile picture

Guides Writer

Expertise :

Abubakar is a seasoned Tech Journalist who covers everything Android and consumer electronics. He's a die-hard self-repair enthusiast who loves to dive into the specifics of consumer tech. In his free time, you will find him writing lyrical poetry. He has previously worked with Android Police and How-to Geek.

Recommended For You

Popular Mobile List