By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: A flaw at MediaTek allowed sensitive data to be recovered in less than a minute
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > A flaw at MediaTek allowed sensitive data to be recovered in less than a minute
Mobile

A flaw at MediaTek allowed sensitive data to be recovered in less than a minute

News Room
Last updated: 2026/03/15 at 9:11 AM
News Room Published 15 March 2026
Share
A flaw at MediaTek allowed sensitive data to be recovered in less than a minute
SHARE

Connecting a smartphone to a computer should not be enough to extract sensitive data. However, according to security researchers, some Android models could be compromised in less than a minute via a simple USB connection. The vulnerability was discovered by Donjon, the hardware security research team at Ledger, the French company well known for its physical cryptocurrency wallets. To demonstrate the feat, the researchers used the CMF Phone 1, an Android smartphone launched in 2024 by the Nothing brand.

A compromised phone in 45 seconds

The result is rather telling. “ Ledger’s Dungeon plugged a CMF Phone 1 into a laptop and compromised the phone’s basic security in 45 seconds », Explains Charles Guillemet, technical director of Ledger. The attack is all the more worrying because it works before Android even starts. Researchers exploit a weak point in the phone’s secure boot chain. Once connected to a computer, the attacker can retrieve certain cryptographic keys from the system and then access the phone’s data.

Twitter-tweet” data-width=”500″ data-dnt=”true”>

Without ever even booting into Android, the exploit automatically recovered the phone’s PIN, decrypted its storage, and extracted the seed phrases from the most popular software wallets.

— Charles Guillemet (@P3b7_) March 11, 2026

During their tests, the researchers managed to recover several sensitive pieces of information: the phone’s PIN code; data stored in internal memory; seed sentences for cryptocurrency wallets. These famous phrases serve as the master key to restoring a crypto wallet. In other words, recovering them potentially allows you to take control of the associated assets.

The researchers say they extracted this information from several popular wallets, including Trust Wallet, Kraken Wallet, Rabby or Phantom. The vulnerability concerns smartphones equipped with MediaTek processors using a Trusted Execution Environment (TEE) provided by the company Trustonic.

The principle of TEE is simple: isolate certain sensitive operations, such as cryptographic key management, in a secure area of ​​the processor. On paper, this helps protect important data from the rest of the system. In practice, this area remains integrated into the same processor as the rest of the smartphone, which can pose a problem during physical attacks.

Charles Guillemet summarizes the difference with other approaches: “ General purpose chips are designed for ease of use. Secure Elements are designed to protect keys. » Certain devices indeed adopt a different architecture. iPhones, Pixels or even certain smartphones equipped with Snapdragon processors use a dedicated security component, such as Apple’s Secure Enclave or Google’s Titan M2, which physically isolates sensitive information from the rest of the system. A hardware separation that significantly complicates direct attacks on the device.

The Donjon team notified MediaTek and Trustonic before any publication, in accordance with responsible disclosure practices. MediaTek says it provided fixes to smartphone makers on January 5. The devices concerned should therefore be protected via software updates distributed by the manufacturers.

🟣 To not miss any news on the WorldOfSoftware, follow us on Google and on our WhatsApp channel. And if you love us, .

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article One Of The Best-Rated Indoor Security Cameras On Amazon Is Half The Price Of A Google Nest Cam – BGR One Of The Best-Rated Indoor Security Cameras On Amazon Is Half The Price Of A Google Nest Cam – BGR
Next Article plan itineraries and answer your questions plan itineraries and answer your questions
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple’s 2026 Studio Display Hits New Low Prices on Amazon at Up to 0 Off
Apple’s 2026 Studio Display Hits New Low Prices on Amazon at Up to $100 Off
News
'Marshals': When Does Episode 3 Premiere on Paramount Plus?
'Marshals': When Does Episode 3 Premiere on Paramount Plus?
News
The Galaxy S26 Ultra’s Privacy Display Is a Game Changer, But Is It Worth ,300?
The Galaxy S26 Ultra’s Privacy Display Is a Game Changer, But Is It Worth $1,300?
News
Amazon Doesn’t Want Sellers Listing These Tech Products – Here’s Why – BGR
Amazon Doesn’t Want Sellers Listing These Tech Products – Here’s Why – BGR
News

You Might also Like

plan itineraries and answer your questions
Mobile

plan itineraries and answer your questions

8 Min Read
Marlon Brando rejected an Oscar in 1973. His authentic story is worthy of the best thriller film
Mobile

Marlon Brando rejected an Oscar in 1973. His authentic story is worthy of the best thriller film

7 Min Read
Samsung prepares its entry into the connected glasses market
Mobile

Samsung prepares its entry into the connected glasses market

3 Min Read
RSAT on Windows 11 ARM, now available
Mobile

RSAT on Windows 11 ARM, now available

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?