MediaTek Dimensity 7300 flaw can expose Android PINs and wallet data in under a minute


A newly disclosed MediaTek security flaw can let a physical attacker break into some Android phones and recover highly sensitive data before Android even starts. Researchers say the issue can expose the device PIN, decrypt local storage, and pull crypto wallet recovery phrases from affected phones in about 45 seconds in a proof-of-concept attack.

The weakness sits in the boot ROM of the MediaTek Dimensity 7300, also known as MT6878. That matters because boot ROM is the first code that runs on the chip and it executes at the highest privilege level, well before Android loads. Ledger’s Donjon team says it achieved arbitrary code execution at EL3, which is the top hardware privilege level on the platform.

The attack is not remote. An attacker needs physical access to the phone, a wired connection, and specialized fault-injection equipment. Still, the result is serious because the compromise happens below the operating system, which lets an attacker bypass many normal Android protections. MediaTek says it issued fixes to device makers in January 2026 and that it is not aware of active exploitation in the wild at the time of its bulletin.

Ledger demonstrated the attack on the Nothing CMF Phone 1, which uses the Dimensity 7300. In public statements, Ledger CTO Charles Guillemet said researchers plugged the phone into a laptop and breached its foundational security within 45 seconds. Android Authority separately reported that the team recovered the PIN, decrypted storage, and extracted wallet data without booting Android.

Why this flaw matters

This is not a standard Android app bug. It targets the trust chain at the chip level. Ledger says smartphones can be lost or stolen, which means attackers do not always need malware or a remote exploit. If they can physically handle the device, early boot stages like boot ROM and bootloaders become a powerful target.

The bigger problem is durability. Ledger explains that boot ROM code is hard-coded into silicon, so the underlying hardware flaw itself cannot be fully removed with a normal software update. MediaTek can still reduce risk through mitigations and updated security logic delivered to OEMs, but the original silicon weakness remains a concern for affected hardware.

This also raises concerns for software wallets and other apps that rely on the phone as a trusted base. Reports on Ledger’s findings say the team extracted seed phrases from apps including Trust Wallet, Kraken Wallet, Phantom, Base, Rabby, and Tangem’s mobile wallet during testing. Those app-specific results come from reporting on the research rather than MediaTek’s own bulletin, so admins and users should treat the wallet list as proof-of-concept exposure, not as a vendor-issued compatibility matrix.

What the attack targets

ItemDetails
ChipMediaTek Dimensity 7300 / MT6878
Attack typeElectromagnetic fault injection during early boot
Access neededPhysical access, USB connection, specialized equipment
Main impactPIN recovery, storage decryption, pre-OS compromise
Privilege level reachedEL3, the highest hardware privilege level
Demo deviceNothing CMF Phone 1
Patch statusMediaTek says it sent fixes to OEMs in January 2026
Exploitation statusMediaTek says it has no evidence of active exploitation

Source basis: Ledger Donjon research, MediaTek January 2026 bulletin, and follow-up reporting.

How the attack works

Ledger says the researchers used electromagnetic fault injection, or EMFI, to disturb the chip during boot. The technique sends a timed electromagnetic pulse near the processor so execution goes off course at a critical moment. According to Ledger, that gave researchers a way to bypass early security checks and run code at the chip’s highest privilege level.

Because the compromise happens before Android starts, many protections in the operating system never get a chance to help. That is why the attack can reach secrets that users usually assume stay protected when the phone is locked or powered off.

What users and enterprises should do now

  • Install the latest vendor and OEM security updates available for your phone. MediaTek says it provided patches to device makers in January 2026.
  • Check whether your device uses the Dimensity 7300 or MT6878 chipset.
  • Treat physical device access as a bigger risk than usual for affected models.
  • Avoid storing high-value crypto seed phrases on a standard smartphone if you can use a dedicated hardware wallet instead. This reflects Ledger’s security guidance and threat model.
  • Use a strong PIN and keep devices with you, especially while traveling or at public events.
  • For enterprise fleets, track OEM patch rollout status rather than assuming the silicon vendor patch reached end users immediately.

FAQ

Does this flaw let someone hack a phone remotely?

No. The reported attack requires physical access to the phone, a USB connection, and specialized electromagnetic fault-injection hardware.

Can MediaTek fully fix the hardware bug with software?

Not completely. Ledger says the flaw lives in boot ROM, which is etched into silicon. MediaTek has still issued patches and mitigations to OEMs that can reduce the practical attack path.

Which phone did researchers test?

Ledger’s team demonstrated the attack on the Nothing CMF Phone 1, which uses the MediaTek Dimensity 7300.

Are attacks already happening in the wild?

MediaTek says it is not aware of active exploitation in the wild at the time of its January 2026 product security bulletin.

Should Android users panic?

No, but affected users should take it seriously. This is a physical attack, not a mass remote worm. The bigger risk falls on stolen devices, targeted attacks, and people who store highly sensitive secrets such as wallet recovery phrases on their phones.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages