By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Security researchers broke into a MediaTek-powered Nothing phone in just 45 seconds
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Security researchers broke into a MediaTek-powered Nothing phone in just 45 seconds
News

Security researchers broke into a MediaTek-powered Nothing phone in just 45 seconds

News Room
Last updated: 2026/03/12 at 12:46 AM
News Room Published 12 March 2026
Share
Security researchers broke into a MediaTek-powered Nothing phone in just 45 seconds
SHARE

Ryan Haines / Android Authority

TL;DR

  • Security researchers from Ledger’s Donjon team discovered a vulnerability in MediaTek-powered Android phones that allowed them to break into the CMF Phone 1 by Nothing in just 45 seconds.
  • The exploit reportedly worked without even booting Android, allowing the researchers to recover the phone’s PIN, decrypt its storage, and extract crypto wallet data.
  • MediaTek says it issued a fix to device makers in January 2026, but the flaw could potentially affect millions of Android devices.

Security researchers have discovered a serious vulnerability in MediaTek-powered Android phones that could allow attackers to extract sensitive user data even when the device is powered off.

Don’t want to miss the best from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

The flaw was uncovered by Donjon, the hardware security research team run by crypto hardware wallet company Ledger. According to Ledger CTO Charles Guillemet’s posts on X, the vulnerability could affect millions of Android devices with MediaTek processors that use Trustonic’s Trusted Execution Environment (TEE).

Guillemet said the team used the CMF Phone 1 by Nothing to demonstrate the exploit and managed to gain access to the phone’s protected data in less than a minute.

“The Ledger Donjon plugged a CMF Phone 1 into a laptop and breached the phone’s foundational security within 45 seconds,” he wrote.

Donjon MediaTek Post X

According to the researchers, the exploit works without ever booting the Android operating system. Once the phone is connected to a computer, the attack can automatically retrieve the device’s PIN, decrypt its storage, and extract seed phrases from popular software cryptocurrency wallets.

These seed phrases are essentially the master keys used to recover crypto wallets, making them extremely valuable targets for attackers.

Many MediaTek devices rely on a Trusted Execution Environment (TEE), a secure area inside the main processor, to protect sensitive data. The TEE is protected through software isolation and hardware privileges, but it’s still very much a part of the main chip.

In contrast, Pixel phones, iPhones, and many Snapdragon devices use dedicated hardware security processors such as the Titan M2, Secure Enclave, or the Qualcomm Secure Processing Unit to keep sensitive information isolated from the main chip.

Guillemet said the issue highlights a deeper design problem with many consumer devices.

“General-purpose chips are built for convenience,” he explained. “Secure Elements are built for key protection.”

Unlike typical smartphone chips, dedicated Secure Elements isolate sensitive secrets from the rest of the system. According to Ledger, this separation helps protect the hardware from physical attacks.

Fixes have already been issued

The vulnerability found in MediaTek chips has been assigned the identifier CVE-2026-20435. The Donjon team says it followed a responsible disclosure process and informed MediaTek before making the vulnerability public.

MediaTek confirmed to the security research firm that it provided fixes to device manufacturers on January 5, 2026, meaning the vulnerability should be patched in software updates from affected phone makers.

This isn’t the first time Ledger’s research group has uncovered security weaknesses in MediaTek hardware.

However, it’s unclear if the vulnerability has been exploited by attackers and its potential impact on existing devices. MediaTek chips power millions of devices across multiple price tiers.

Affected MediaTek Chips

The chipmaker’s March security bulletin lists the affected processors, including those powering entry-level to flagship phones from the likes of OPPO, vivo, OnePlus, and Samsung. You can compare the model names and check online whether your phone features one of the affected chipsets, though patches for the flaw should already be available or be coming soon from your phone maker.

This isn’t the first time Ledger’s research group has uncovered security weaknesses in MediaTek hardware. Last year, the Donjon team discovered fault injection vulnerabilities in the MediaTek Dimensity 7300 chipset, resulting in a complete security compromise.

At the time, MediaTek responded by saying such attacks fall outside the intended threat model for the chipset.

Thank you for being part of our community. Read our Comment Policy before posting.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Microsoft’s ‘Xbox mode’ is coming to every Windows 11 PC Microsoft’s ‘Xbox mode’ is coming to every Windows 11 PC
Next Article ZKPs: How Agencies Survive Google’s Post-Core Ad Apocalypse | HackerNoon ZKPs: How Agencies Survive Google’s Post-Core Ad Apocalypse | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

4 Mistakes That Can Ruin Your PlayStation 5 Controller – BGR
4 Mistakes That Can Ruin Your PlayStation 5 Controller – BGR
News
Your refrigerator has a compartment designed for eggs in the door. It’s the worst possible place to keep them.
Your refrigerator has a compartment designed for eggs in the door. It’s the worst possible place to keep them.
Mobile
Oracle cuts its workforce, but spends lavishly on AI
Oracle cuts its workforce, but spends lavishly on AI
Mobile
Grab this Fan Edition Samsung tablet for less with Amazon’s ongoing sale
Grab this Fan Edition Samsung tablet for less with Amazon’s ongoing sale
News

You Might also Like

4 Mistakes That Can Ruin Your PlayStation 5 Controller – BGR
News

4 Mistakes That Can Ruin Your PlayStation 5 Controller – BGR

9 Min Read
Grab this Fan Edition Samsung tablet for less with Amazon’s ongoing sale
News

Grab this Fan Edition Samsung tablet for less with Amazon’s ongoing sale

3 Min Read
How much will RAMageddon hike flagship prices? Top phone executive reveals the cost
News

How much will RAMageddon hike flagship prices? Top phone executive reveals the cost

3 Min Read
HBO Max: The 31 Absolute Best TV Shows to Watch
News

HBO Max: The 31 Absolute Best TV Shows to Watch

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?