Qualcomm vulnerability: phone repairs and car maintenance are no longer safe
#1
Exclamation 
Quote:Our experts have discovered an unpatchable vulnerability in Qualcomm chips used everywhere: from smart-home devices, smartphones and cars, to industrial equipment. What risks does it pose, and what can you do to protect yourself?
 
Imagine handing your smartphone over for repair. A couple of days later, you pick it up — and great, it’s working again! But you won’t even realize that your device has been injected with malicious code, allowing attackers to access your smartphone even when it’s locked.

This is the beginning of the story shared by Kaspersky ICS CERT researchers, Alexander Kozlov and Sergey Anufrienko, at the Black Hat Asia 2026 conference. They managed to uncover a vulnerability that flips conventional assumptions about smartphone and IoT security on their head. Its core lies at the very heart of Qualcomm chips.

What is BootROM?

To grasp the severity of this discovery, we first need to look at how a modern device powered by a Qualcomm chip boots up. Think of it as a fortress with multiple layers of security. Each subsequent layer verifies the pass issued by the previous one. The bedrock foundation — the most trusted layer of them all — is the BootROM, a read-only memory baked directly into the silicon that can’t be modified once it comes off the fab.

The BootROM is the very first thing to run when a device powers on. It verifies the signature of the next bootloader, which in turn verifies the next, building a chain of trust all the way up to the operating system. If an attacker can compromise this chain at the BootROM level, it’s game over: the malicious code will execute before the main operating system even has a chance to load.

This is exactly what attackers can do by exploiting the CVE-2026-25262 vulnerability discovered by Kaspersky ICS CERT researchers.

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 3 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
K-Lite Codec Pack 19.7.0 / 19.7.1 Update
Changes in 19.7.0:...harlan4096 — 07:19
Sophos Home for Windows 2025.2
Applies to: Sophos...harlan4096 — 07:15
Vivaldi 8.0 Build 4033.28
Vivaldi 8.0 Build ...harlan4096 — 07:12
Google API Key Issue Allows Deleted Keys...
Google Cloud API k...harlan4096 — 07:11
Qualcomm vulnerability: phone repairs an...
Our experts have d...harlan4096 — 07:10

[-]
Birthdays
Today's Birthdays
avatar (40)odukoromu
Upcoming Birthdays
avatar (39)axuben
avatar (40)ihijudu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>