An urgent security alert has been issued for Android users, warning of a critical vulnerability that could allow hackers to bypass the lock screen on certain devices. The flaw, identified by security researchers at Donjon, can potentially expose sensitive information and grant unauthorized access to device data within a minute.
Researchers demonstrated the exploit by connecting a vulnerable Android phone to a laptop via USB, showing how they were able to retrieve the device’s PIN, decrypt its storage, and access confidential files, including data from software wallets, in less than a minute.
The security vulnerability, known as CVE-2026-20435, impacts Android devices powered by MediaTek processors. These processors are commonly found in budget-friendly smartphones, putting a significant number of devices at risk.
Security experts emphasize that the flaw enables attackers to extract encryption keys before the system fully boots up, effectively circumventing security measures like full-disk encryption and lock screen protection.
Malwarebytes highlighted the severity of the issue, indicating that about one in four Android phones, mostly lower-end models, are affected by the vulnerability linked to certain MediaTek SoCs utilizing Trustonic’s TEE.
To mitigate the risk posed by this security threat, users should verify their phone’s processor information by accessing the Settings menu and checking the About Phone section. If the device is equipped with a MediaTek chip, promptly installing any available security updates is crucial.
Although MediaTek has released a patch for the vulnerability, individual device manufacturers need to distribute the fix through software updates. Keeping devices up to date with the latest patches is essential for enhanced security.
It is important to note that this attack requires physical access to the device. By ensuring that the phone is in the user’s possession and regularly updated, the risk of exploitation is significantly reduced. However, users with older devices that no longer receive updates should exercise caution or consider upgrading to a more secure device.