Android PIN theft flaw affects over a billion devices even when powered off

Zaid Al-Mansouri
By
Zaid Al-Mansouri
AI-powered tech writer covering smartphones, wearables, and mobile technology.
10 Min Read
Android PIN theft flaw affects over a billion devices even when powered off — AI-generated illustration

An Android PIN theft vulnerability discovered by Ledger’s Donjon security team exposes a fundamental weakness in how over a billion Android devices protect sensitive data. The flaw, tracked as CVE-2026-20435, allows attackers with physical access to extract PINs, decrypt storage, and steal cryptocurrency seed phrases in under 45 seconds—even from powered-off phones. The vulnerability affects primarily budget and mid-range Android models from OPPO, vivo, OnePlus, Samsung, and Nothing, representing roughly one in four Android phones globally.

Key Takeaways

  • CVE-2026-20435 affects over a billion Android devices using MediaTek SoCs and Trustonic’s TEE architecture
  • Exploit requires only physical access and completes in 45 seconds on powered-off devices
  • Attackers can extract PINs, decrypt messages and photos, and steal cryptocurrency wallet seed phrases
  • MediaTek issued a firmware patch on January 5, 2026; rollout depends on individual manufacturers
  • Devices with Secure Element chips (Google Pixel, iPhone, high-end Snapdragon) are not affected

How the Android PIN theft vulnerability works

The Android PIN theft vulnerability stems from a critical flaw in how MediaTek’s System-on-Chip (SoC) handles the Trusted Execution Environment, a supposedly isolated zone where sensitive operations occur. According to Ledger CTO Charles Guillemet, the Donjon team breached a Nothing CMF Phone 1 in 45 seconds by connecting it to a laptop, extracting the device PIN and decrypting all stored data without ever booting the operating system. The attack works on powered-off devices because it targets the hardware layer before Android even loads, bypassing every software security measure users rely on.

The root cause lies in MediaTek’s TEE architecture, which fails to properly isolate sensitive data from the main processor. Trustonic, which provides the TEE software, claims the issue is specific to MediaTek’s chip design rather than its security framework—the same TEE runs securely on non-MediaTek processors. This architectural gap means attackers can read encryption keys and credentials directly from memory without needing to know the user’s PIN, rendering lock screens useless.

Which devices are vulnerable to Android PIN theft

The Android PIN theft vulnerability affects approximately one in four Android phones, primarily entry-level and mid-range models. Confirmed vulnerable devices include the Nothing CMF Phone 1, along with phones powered by affected MediaTek Dimensity and Helio chips from manufacturers like OPPO, vivo, OnePlus, and Samsung. The Donjon team previously discovered a similar flaw in the MediaTek Dimensity 7300 processor last year, suggesting a pattern of security oversights in MediaTek’s TEE implementation.

High-end devices using Snapdragon processors, Google Pixels with dedicated Secure Element chips, and iPhones with Apple’s security architecture remain unaffected. The vulnerability’s reach is staggering—billions of users worldwide carry phones that can be breached in under a minute with nothing more than a laptop connection and physical access to the device.

What data can attackers steal through this vulnerability

Once an attacker exploits the Android PIN theft vulnerability, they gain access to everything the phone’s encryption was meant to protect. The exploit extracts user PINs and passwords, decrypts the device’s internal storage to access messages and photos, and critically, retrieves cryptocurrency wallet seed phrases from software wallets. For crypto users, seed phrase theft is catastrophic—it grants complete control over all digital assets without requiring the wallet password or PIN.

The threat extends beyond personal privacy. Business users carrying mid-range Android phones may have work emails, corporate documents, and authentication tokens exposed. The speed of the attack—45 seconds—means a thief at an airport, border crossing, or busy street could compromise a device and vanish before the owner notices it missing.

When will the Android PIN theft vulnerability be patched

MediaTek issued a firmware patch addressing the Android PIN theft vulnerability on January 5, 2026, months before public disclosure. However, the patch’s availability depends entirely on individual device manufacturers, creating a patchwork rollout timeline. Samsung, OnePlus, and other major brands typically release security updates monthly, but budget manufacturers often lag significantly—some devices may never receive updates if they’ve reached end-of-life status.

Users should check their device’s March 2026 security bulletin to confirm whether their specific model is affected and whether a patch is available. The vulnerability was publicly disclosed around March 11-13, 2026, giving manufacturers weeks to prepare rollouts, yet many users will remain unpatected for months. For devices running Android 12 or earlier on entry-level hardware, waiting for a manufacturer update could mean months of exposure.

How to protect yourself from the Android PIN theft vulnerability

The most immediate protection is to check whether your device is vulnerable by identifying your phone’s processor on GSMArena or your manufacturer’s website and comparing it against MediaTek’s March 2026 security bulletin for CVE-2026-20435. If your device is affected, prioritize applying the security patch as soon as your manufacturer releases it. Do not delay—this is not a theoretical vulnerability but a practical attack that requires only physical access and a laptop.

For cryptocurrency users, the stakes are highest. If your phone uses a software wallet and is vulnerable to the Android PIN theft vulnerability, consider moving assets to a hardware wallet (a dedicated device like a Ledger or Trezor) that stores seed phrases offline and cannot be breached by smartphone exploits. Hardware wallets cost between $50 and $150 but protect assets worth far more. If you must use a software wallet on an Android phone, use only devices with Secure Element chips—high-end Snapdragon phones or newer Google Pixels—until your current device receives a patch.

Why MediaTek’s design failed where others succeeded

The Android PIN theft vulnerability exposes a design choice that separates budget Android phones from premium ones: the use of a Trusted Execution Environment versus a dedicated Secure Element. MediaTek’s TEE is a software-based security zone that shares hardware with the main processor, creating an attack surface. In contrast, Google Pixel phones, iPhones, and high-end Snapdragon devices use dedicated Secure Element chips—physically separate processors that handle sensitive operations in complete isolation. This architectural difference means the vulnerability cannot exist on devices with Secure Elements because the attacker cannot reach the isolated chip through a laptop connection.

MediaTek’s cost-cutting approach made sense for budget phones—Secure Elements add $10-20 per unit. But the Android PIN theft vulnerability proves that savings come at the cost of fundamental security. Trustonic’s claim that its TEE is secure on other chips underscores the problem: MediaTek’s implementation is the weak link, not the TEE concept itself.

FAQ

Can the Android PIN theft vulnerability be exploited remotely?

No. The exploit requires physical access to the device and a direct connection to a computer or laptop. Attackers cannot trigger this vulnerability over Wi-Fi, cellular networks, or any wireless method. However, physical access is easier than many assume—a phone left unattended in a café, stolen during travel, or seized at a border crossing is sufficient.

Will my device automatically receive the patch for this vulnerability?

Not necessarily. While MediaTek released a firmware patch on January 5, 2026, your device will only receive it if your manufacturer chooses to deploy it. Major brands like Samsung typically push security updates monthly, but budget manufacturers and devices past their support window may never receive a patch. Check your device’s settings under Security Update to see if a March 2026 bulletin is available for your model.

Is my iPhone or Google Pixel affected by the Android PIN theft vulnerability?

iPhones are not affected—Apple uses its own security architecture. Google Pixels with Secure Element chips are also protected. Only Android devices using MediaTek SoCs with Trustonic’s TEE are vulnerable. If you own a high-end Samsung Galaxy S series, OnePlus flagship, or Snapdragon-powered phone, check your device’s processor to confirm vulnerability status.

The Android PIN theft vulnerability represents a watershed moment for smartphone security. For over a billion users, the promise of encryption and lock screens has been revealed as a false sense of security. The patch exists, but the real test is whether manufacturers will deploy it quickly enough to protect users before attackers weaponize the exploit. Until then, anyone carrying a vulnerable Android phone is one moment of physical access away from total compromise.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering smartphones, wearables, and mobile technology.