World News

Android bug on MediaTek phones can bypass your PIN in less than a minute

NEWNow you can listen to Fox News articles!

Your phone’s lock screen should be your last line of defense. If your device is lost or stolen, that PIN or passcode should keep strangers out of your photos, messages, and financial apps. But researchers have discovered a serious flaw that can bypass those protections on certain Android phones in less than a minute.

Once exploited, attackers can recover your phone’s PIN, unlock encrypted storage, and extract sensitive data such as cryptocurrency seed phrases. Security researchers estimate that about one in four Android phones could be affected, especially budget phones.

Sign up for my FREE CyberGuy report Get my best tech tips, emergency security alerts, and special deals delivered straight to your inbox. For easy real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by the millions who watch CyberGuy on TV every day. Plus, you’ll get instant access to mine Ultimate Scam Survival Guide free when you join.

ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE

Google’s March Android security update fixes 129 vulnerabilities, including zero-day flaws that have already been used in targeted attacks. (Firdous Nazir/NurPhoto)

All about Android hacking error

The newly disclosed vulnerability, tracked as CVE-2026-20435 in the National Vulnerability Database, affects certain Android phones powered by MediaTek, a major Taiwan-based smartphone chip maker that competes with companies such as Qualcomm. These phones use a security component called Trustonic’s Trusted Execution Environment (TEE), designed to keep sensitive data, such as encryption keys, secure throughout the system.

It stores cryptographic keys that help keep your device encrypted and secure, even if someone tries to tamper with it. However, a security vulnerability analysis shows that these protections may be compromised on the affected devices.

By connecting the phone to a computer using a USB cable, an attacker with physical access may be able to exploit a flaw during the early boot process, possibly exposing sensitive data before full security protections are applied. Think of it as getting to the master key before the safe door closes. Once attackers gain access to these low-level components, they can access encrypted storage without needing your PIN.

In a worst-case scenario, this type of access can allow attackers to extract highly sensitive information, including personal photos, saved passwords, private messages, financial data, and crypto wallet credentials. If the seed phrases of crypto wallets are exposed, attackers can withdraw money forever.

What Android makers do with this

There are limited measures manufacturers can take themselves since the problem is from the processor level, which is produced by MediaTek. The company says it has released a firmware patch that fixes the vulnerability. However, the update has yet to be distributed by individual phone manufacturers for security updates. Depending on the device and whether it’s still supported, that update may or may not arrive at all.

The good thing is that this attack requires physical access to the phone and a USB connection to the computer. That means it can’t be done remotely over the internet. However, if your phone is stolen, hijacked, or taken while it’s being repaired, an attacker may leak sensitive information.

If you’re not sure if this vulnerability affects your mobile device, you can check your phone on a site like GSMArena or your vendor’s website to see what SoC it uses, then check it with MediaTek’s March security information under CVE-2026-20435. You can log in to corp.mediatek.com/product-security-bulletin/March-2026 to review the list of affected chipsets and confirm whether your device is vulnerable.

CyberGuy reached out to MediaTek for comment, but they did not respond before our deadline.

NEW ANDROID TRICKS YOU INTO GRANTING DANGEROUS PERMISSIONS

A woman uses a cell phone near a window in a house

A new banking trojan for Android called Sturnus can control your screen, steal your banking information and even read encrypted conversations in trusted apps. (Delmaine Donson/Getty Images)

How to tell if your phone is infected

So how do you know if your phone is really vulnerable? Not all Android phones are vulnerable. The problem mainly affects devices using certain MediaTek processors. Here’s how to check your phone:

1) Find your phone model

Go to Settings > About the phone then look up your model name exactly.

2) Check your processor (chip)

Search for yours phone model on a site like GSMArena or your manufacturer’s website to find the processor (also called SoC).

3) Check that it uses MediaTek

If your phone uses the MediaTek chipmay be affected. Devices with Qualcomm Snapdragon or Google Tensor chips are not part of this particular problem.

4) Install the latest security updates immediately

Check your phone’s system settings and install any available updates from your manufacturer. Go to Settings > Software update and enter any updates available. MediaTek has already released a fix, but phone makers have to distribute it. Installing updates immediately ensures that you receive a firmware patch when your device manufacturer releases it.

7 ways to protect your phone from hacking

If your phone uses one of the affected chips, a few precautions can help reduce the chances of someone accessing your data if the device falls into the wrong hands.

1) Install strong antivirus protection

The security application cannot fix this processor-level error. However, it can still help protect your phone from other threats that often follow stolen or damaged devices. It won’t stop this particular exploit, but it can detect malicious apps, spyware, and suspicious activity that attackers might install after gaining access. That extra layer of protection can help stop more data theft if your device falls into the wrong hands. Find my picks for the best antivirus 2026 winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

2) Avoid storing sensitive information on your phone

If you store things like cryptocurrency seed phrases, recovery codes, or sensitive documents in note apps or screenshots, consider moving them to a secure offline location. If someone extracts your phone data through this vulnerability, that information can be exposed.

3) Maintain physical control of your phone

This exploit requires someone to physically connect your phone to a computer. Do not leave your phone unattended in public places, and be careful when handing it over to repair shops or unknown technicians. Physical access greatly increases the risk.

4) Use strong screen lock and auto lock settings

While the vulnerability goes beyond encryption on affected devices, strong lock settings still protect against many other threats. Use a long PIN or passcode instead of simple patterns, and enable automatic locking after a short period of inactivity.

5) Secure accounts with two-factor authentication

Even if attackers gain access to data on your phone, two-factor authentication (2FA) can prevent them from accessing your online accounts. Enable email, banking applications, cloud storage, and social media where possible.

6) Use a password manager

A password manager stores your login credentials in a secure, encrypted place instead of leaving them scattered across all apps and notes. If someone compromises your device, a password manager still protects your accounts with strong encryption, forcing attackers to break through another layer of security before they can access your login. Check out the best password managers reviewed in 2026 at Cyberguy.com

7) Enable USB restricted mode (if available)

Some Android devices restrict USB data access when locked. Enabling this setting can reduce the risk of unauthorized data extraction over a wired connection, especially in cases where someone briefly gains access to your phone. For Samsung phones running the latest software:

Settings may vary slightly depending on your Samsung model and software version.

  • Go to Settings
  • Tap Lock the screen
  • Then, click Protect lock settings
  • Come in Your current PIN, then tap Go ahead
  • Empower “Lock the network and security” (or an option with the same name) to help block USB data access while your device is turned off.
A man in a suit is typing on his phone

ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/photo alliance)

The key to take Kurt

This vulnerability reveals a deeper problem with the Android ecosystem. Even when chipmakers release fixes, millions of phones rely on manufacturers to deliver updates that may never arrive, especially for cheaper devices that quickly lose support. We often think that our lock screen and encryption will protect our data if the phone is lost or stolen. However, incidents like this show that protection is only as strong as the recovery policies behind it. When devices stop receiving security patches, those protections become silently weaker over time.

Should phone manufacturers be required to ensure security updates for several years if their devices contain encryption vulnerabilities? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS PROGRAM

Sign up for my FREE CyberGuy report Get my best tech tips, emergency security alerts, and special deals delivered straight to your inbox. For easy real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by the millions who watch CyberGuy on TV every day. Plus, you’ll get instant access to mine Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button