New Releases

Qualcomm confirms a Snapdragon BootROM flaw that researchers say could expose phones, IoT gear, and automotive systems

Reading Guide

2 min read

Qualcomm confirms a Snapdragon BootROM flaw that researchers say could expose phones, IoT gear, and automotive systems

Security researchers at Kaspersky say they uncovered a hardware-level issue in multiple Qualcomm Snapdragon chip families, and the company had already confirmed the flaw in April 2025. The vulnerability is being tracked as CVE-2026-25262 and was also discussed during Black Hat Asia 2026.

According to the report summarized by IT Home, the affected chip lines include MDM9x07, MSM9x45, MSM8916, and SDX50. Those platforms have been used across a wide range of products, not just phones, which is why the scope of this bug matters more than a normal handset-only security story.

The weakness reportedly sits inside BootROM firmware embedded at the hardware layer. Researchers say an attacker could use it to bypass core protections in the secure boot chain, plant a malicious backdoor, and ultimately gain deep control over a compromised device.

The attack path is tied to the Sahara protocol, a low-level communication mechanism used in emergency download mode before the operating system fully loads. Because that protocol works so early in the startup process, a flaw there can undermine safeguards that would normally stop unauthorized code from taking hold.

Kaspersky says the issue could let someone with physical access compromise the application processor and potentially steal passwords, files, contacts, and location data. The same access could also be used to turn on the camera or microphone for covert monitoring.

One especially troubling part of the report is how little equipment is supposedly needed. The researchers say the infection process can be completed in just a few minutes of physical access, which raises concerns not only for individual owners but also for repair channels, supply-chain handling, and any environment where devices temporarily leave a user’s control.

The broader warning is that this kind of BootROM vulnerability can be unusually hard to detect or remove once a system has been compromised. Researchers say an infected device may even mimic a normal reboot state, leaving a user with little sign that malicious code is still present unless power is fully cut or the battery is exhausted.

That makes this more than another routine patch-cycle headline. If the findings hold across the affected hardware lines, the issue highlights how low-level silicon security can ripple outward into smartphones, connected devices, and embedded systems that were never designed with easy post-compromise recovery in mind.

Previous OPPO warns buyers about low-price phone scams that bypass official platform protection Next Google may give the Pixel 11 Pro Fold a new Pine finish, hinting at a bolder color direction for its premium foldable line
C
About cizchu

Senior Technology Editor with 10 years of experience covering mobile technology.

Recommended Articles