UK Android Users at Risk: Critical Qualcomm Chip Fault Enables Widespread Attacks
UK Android Users at Risk: Critical Qualcomm Chip Fault Enables Widespread Attacks
A critical security flaw in widely used Qualcomm processors has put numerous Android devices in the UK at risk, with security researchers warning that attackers could take complete control of affected devices and access sensitive data.
The vulnerability lies deep within the system, specifically in the BootROM of certain Qualcomm chips, which is hard-coded into the hardware and runs before the operating system starts.
This firmware is precisely what makes the flaw particularly critical, with the vulnerability registered under the identifier CVE-2026-25262, and Qualcomm informed as early as March 2025.
The affected Qualcomm chips include MDM9x07, MDM9x45, MDM9x65, MSM8909, MSM8916, MSM8952, and SDX50, with other chips potentially vulnerable.
The good news is that these are fairly old chipsets, released between 2014-2019, found in cheaper devices and flagship phones from many years ago, including the Samsung Galaxy S10 5G, LG V50 ThinQ 5G, and Xiaomi Mi Mix 3 5G.
Other devices, such as the Galaxy S7 and S8 models, Google Pixel 2/2XL, LG G5, HTC One A9, Motorola Moto G4/G4 Plus, and Honor 4A, are also affected, but considered ‘end of line’ and no longer receive software support.
Attacks are possible even before booting, with the investigation focusing on the Sahara protocol, used when devices switch to Emergency Download Mode (EDL), allowing malware to be embedded deep within the system.
If a device is compromised, the possibilities are far-reaching, with attackers able to access stored files and contacts, read passwords and location data, activate the camera and microphone, and take complete control of the device.
Security researchers point out that such attacks don’t only affect ordinary users, but devices could also be tampered with within the supply chain, during transport or repairs.
Restarting is not a reliable solution, as installed malware can be embedded so deeply within the system that it is difficult to detect or remove, and compromised devices could feign a restart.
Kaspersky recommends taking precautions, such as only taking devices to reputable repair shops, not leaving smartphones or tablets unattended, and monitoring access to devices, particularly when transporting or handing them over.
