{"id":36250,"date":"2026-05-23T04:21:29","date_gmt":"2026-05-22T17:21:29","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=36250"},"modified":"2026-05-23T04:21:29","modified_gmt":"2026-05-22T17:21:29","slug":"qualcomm-cve-2026-25262","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/qualcomm-cve-2026-25262\/36250\/","title":{"rendered":"Qualcomm vulnerability: phone repairs and car maintenance are no longer safe"},"content":{"rendered":"<p>Imagine handing your smartphone over for repair. A couple of days later, you pick it up \u2014 and great, it\u2019s working again! But you won\u2019t even realize that your device has been injected with malicious code, allowing attackers to access your smartphone even when it\u2019s locked.<\/p>\n<p>This is the beginning of the story shared by Kaspersky ICS CERT researchers, Alexander Kozlov and Sergey Anufrienko, at the <a href=\"https:\/\/blackhat.com\/asia-26\/\" target=\"_blank\" rel=\"noopener nofollow\">Black Hat Asia 2026 conference<\/a>. They managed to uncover a vulnerability that flips conventional assumptions about smartphone and IoT security on their head. Its core lies at the very heart of Qualcomm chips.<\/p>\n<h2>What is BootROM?<\/h2>\n<p>To grasp the severity of this discovery, we first need to look at how a modern device powered by a Qualcomm chip boots up. Think of it as a fortress with multiple layers of security. Each subsequent layer verifies the pass issued by the previous one. The bedrock foundation \u2014 the most trusted layer of them all \u2014 is the BootROM, a read-only memory baked directly into the silicon that can\u2019t be modified once it comes off the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Semiconductor_device_fabrication\" target=\"_blank\" rel=\"noopener nofollow\">fab<\/a>.<\/p>\n<p>The BootROM is the very first thing to run when a device powers on. It verifies the signature of the next bootloader, which in turn verifies the next, building a chain of trust all the way up to the operating system. If an attacker can compromise this chain at the BootROM level, it\u2019s game over: the malicious code will execute before the main operating system even has a chance to load.<\/p>\n<p>This is exactly what attackers can do by exploiting the <a href=\"https:\/\/ics-cert.kaspersky.com\/vulnerabilities\/qualcomm-chipsets-series-write-what-where-condition-vulnerability-in-bootrom\/\" target=\"_blank\" rel=\"noopener\">CVE-2026-25262<\/a> vulnerability discovered by Kaspersky ICS CERT researchers.<\/p>\n<h2>Emergency Download Mode as an entry point<\/h2>\n<p>The research began with a protocol called Sahara. This is a component of Emergency Download Mode (EDL). Manufacturers and service centers use it to revive bricked devices: the phone is connected to a computer via USB, and a special utility program signed by the manufacturer (in this case, Qualcomm) is uploaded to it.<\/p>\n<p>Sahara is implemented directly within the ARM PBL (Primary Boot Loader) \u2014 the BootROM itself. This means the protocol runs before any operating system boots, before any user access privileges are checked, and before any security controls are activated. The device simply waits for a USB connection, ready to accept data.<\/p>\n<p>The communication scheme looks simple: the device sends a handshake (HELLO) to the computer, the computer selects the mode, a cycle begins to upload the utility program in chunks, and finally, the device executes the uploaded code. And it was within the verification logic of these very file chunks that the vulnerability was identified.<\/p>\n<h2>Write-what-where: the core of the vulnerability<\/h2>\n<p>In technical terms, the bug introduced by the developers is classified as CWE-123: Write-What-Where Condition. This is about as bad as it gets when it comes to flaws in low-level programming. An attacker can write arbitrary data to an arbitrary address in the device memory.<\/p>\n<p>Without diving too deep into the technical weeds, suffice it to say that by exploiting the discovered vulnerability, attackers can gain access to any data on the device, including user-entered passwords, files, contacts, geolocation data, as well as the hardware sensors like the camera and microphone. In certain scenarios, complete control over the device is possible. Just a few minutes of physical access to the device via a cable connection, and the gadget has been compromised. This creates a risk if you hand your smartphone over to a repair shop, pass it to someone else to set up and install apps on, or just leave it unattended.<\/p>\n<h2>Which devices are affected<\/h2>\n<p>The CVE-2026-25262 vulnerability affects the following Qualcomm chip series: MDM9x07, MDM9x45, MDM9x65, MSM8909, MSM8916, MSM8952, and SDX50 \u2014 every single version released to date, until the vulnerability is patched by the manufacturer.<\/p>\n<p>These are no obsolete museum pieces. The MDM9207, which we used for the bulk of our research, is integrated into modem modules for the internet of things (IoT), industrial equipment, smart home devices, healthcare monitoring systems, logistics trackers, and banking terminals. The MSM8916 powers <a href=\"https:\/\/phonesdata.com\/ru\/chipset\/qualcomm\/msm8916-snapdragon-410-(28-nm)\/\" target=\"_blank\" rel=\"noopener nofollow\">many budget smartphones<\/a>, while the SDX50 is used in automotive control units.<\/p>\n<h2>How vulnerable devices get attacked<\/h2>\n<p>The catch is that the attacker needs physical access to the device to pull this off. In the real world, this translates to:<\/p>\n<ul>\n<li>Smartphone repairs at third-party repair shops, where the phone is left for several hours<\/li>\n<li>Customs checkpoints in certain countries, where devices are withheld, inspected, and then returned<\/li>\n<li>Lost and found scams, where your phone is stolen, tampered with, and then mysteriously found<\/li>\n<li>Corporate espionage via an insider or a rogue employee<\/li>\n<\/ul>\n<p>With just a few minutes of physical access to the device an attacker can plant a backdoor so deep inside that standard research tools won\u2019t even detect it in most cases.<\/p>\n<h2>Why there\u2019s no patch \u2014 and what to do<\/h2>\n<p>Qualcomm was notified of the discovery in March 2025 and confirmed the vulnerability in its chips. To identify it, the vendor reserved <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2026-25262\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2026-25262<\/a>, and on April 20, 2026, Kaspersky ICS CERT <a href=\"https:\/\/ics-cert.kaspersky.com\/vulnerabilities\/qualcomm-chipsets-series-write-what-where-condition-vulnerability-in-bootrom\/\" target=\"_blank\" rel=\"noopener\">published<\/a> technical information on the vulnerability and recommendations for users.<\/p>\n<p>Qualcomm included this vulnerability <a href=\"https:\/\/docs.qualcomm.com\/securitybulletin\/may-2026-bulletin.html\" target=\"_blank\" rel=\"noopener nofollow\">in its May security bulletin<\/a>. While fixing already-made devices is fundamentally impossible, the company promised to make all future chips without this vulnerability.<\/p>\n<p>If you currently own a device with an affected chip, use our recommendations below to help mitigate the risk of infection.<\/p>\n<ul>\n<li>Enforce strict physical control: don\u2019t leave your devices unattended, especially when traveling or on business trips.<\/li>\n<li>Choose only authorized service centers for repairs and maintenance.<\/li>\n<li>Regularly update your firmware \u2014 this won\u2019t patch the BootROM vulnerability, but it can eliminate many related vulnerabilities at higher levels.<\/li>\n<li>Use a <strong><a href=\"https:\/\/www.kaspersky.com.au\/mobile-security?icid=au_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____f4d699061e0733ea\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a><\/strong>\u00a0on your device. This will safeguard your gadget from other threats that, combined with this vulnerability, could lead to unpredictable consequences.<\/li>\n<\/ul>\n<p>If you notice that your gadget with a vulnerable Qualcomm chip starts acting up \u2014 overheating when idle, reporting unexpected spikes in network traffic, or exhibiting strange app behavior \u2014 you may have fallen victim to this vulnerability. You can wipe the malicious code and reset your device to its baseline state simply by completely cutting its power. This means either pulling the battery or letting it drain all the way to zero until the gadget shuts down entirely. In this case, the malicious code will most likely not persist on the device \u2014 during our research, we were unable to confirm that it could achieve persistence in non-volatile memory.<\/p>\n<blockquote><p>Want to learn more about severe vulnerabilities in Android phones? Check out these posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/5g-attack-downgrade-sni5gect\/54258\/\" target=\"_blank\" rel=\"noopener nofollow\">Attacks on 5G networks: the arms race continues<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/gps-agps-supl-tracking-protection\/48175\/\" target=\"_blank\" rel=\"noopener nofollow\">Are geolocation services spying on you?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/54756\/\" target=\"_blank\" rel=\"noopener nofollow\">Pixnapping vulnerability: unblockable screenshots of your Android phone<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/53497\/\" target=\"_blank\" rel=\"noopener nofollow\">Data theft during smartphone charging<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/\" target=\"_blank\" rel=\"noopener nofollow\">Trojan embedded in fake Android smartphones<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic-3\">\n","protected":false},"excerpt":{"rendered":"<p>Our experts have discovered an unpatchable vulnerability in Qualcomm chips used everywhere: from smart-home devices, smartphones and cars, to industrial equipment. What risks does it pose, and what can you do to protect yourself?<\/p>\n","protected":false},"author":2796,"featured_media":36251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646],"tags":[105,3801,658,394,660,44,640],"class_list":{"0":"post-36250","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-bootrom","10":"tag-internet-of-things","11":"tag-qualcomm","12":"tag-smart-home","13":"tag-smartphone","14":"tag-vulnerability"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/qualcomm-cve-2026-25262\/36250\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/qualcomm-cve-2026-25262\/25793\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/qualcomm-cve-2026-25262\/30591\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/qualcomm-cve-2026-25262\/41908\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/qualcomm-cve-2026-25262\/55811\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/qualcomm-cve-2026-25262\/30686\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/qualcomm-cve-2026-25262\/36143\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/36250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2796"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=36250"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/36250\/revisions"}],"predecessor-version":[{"id":36252,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/36250\/revisions\/36252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/36251"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=36250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=36250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=36250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}