Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Breaking down the new Qualcomm chip vulnerability | Kaspersky official blog

0
Medium
Vulnerability
Published: Fri May 22 2026 (05/22/2026, 17:14:23 UTC)
Source: Kaspersky Security Blog

Description

Kaspersky researchers discovered an unpatchable vulnerability (CVE-2026-25262) in the BootROM of multiple Qualcomm chipsets used in smartphones, cars, IoT, and industrial devices. The flaw is a write-what-where condition in the Emergency Download Mode protocol, allowing attackers with physical access to write arbitrary data to device memory before the OS boots. This can lead to unauthorized access to sensitive data and potentially full device control. The vulnerability cannot be patched on existing devices because BootROM is immutable. Qualcomm plans to fix the issue in future chip designs. Mitigations focus on strict physical device control and using authorized repair services. The malicious code does not appear to persist after a full power cycle. No known exploits in the wild have been reported.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/23/2026, 06:38:20 UTC

Technical Analysis

The vulnerability CVE-2026-25262 affects the BootROM of Qualcomm chips including MDM9x07, MDM9x45, MDM9x65, MSM8909, MSM8916, MSM8952, and SDX50 series. It resides in the Sahara protocol used in Emergency Download Mode, which runs before the OS and security controls. The flaw is a CWE-123 write-what-where condition in the verification logic of file chunks uploaded via USB, enabling an attacker with physical access to write arbitrary data to arbitrary memory addresses. This compromises the chain of trust starting at BootROM, allowing execution of malicious code before the OS loads. The vulnerability cannot be patched on existing devices due to the immutable nature of BootROM. Qualcomm confirmed the issue, assigned CVE-2026-25262, and included it in their May 2026 security bulletin. They will fix the design in future chips but existing devices remain vulnerable. Physical access is required for exploitation, such as during third-party repairs or device inspection. The malicious code does not appear to persist in non-volatile memory and can be removed by fully powering off the device. Users are advised to maintain strict physical control, use authorized repair centers, and keep firmware updated to mitigate related risks.

Potential Impact

Exploitation requires physical access to the device via USB. An attacker can write arbitrary data to any memory address in the device's BootROM context, compromising the secure boot chain. This allows unauthorized access to sensitive data (passwords, files, contacts, geolocation) and potentially full device control including hardware sensors. The vulnerability affects a wide range of Qualcomm chips used in smartphones, IoT devices, automotive control units, and industrial equipment. Because the BootROM is immutable, existing devices cannot be patched to fix this flaw. The malicious code does not appear to persist after a full power cycle, reducing long-term persistence risk. No known exploits in the wild have been reported to date.

Mitigation Recommendations

There is no patch available for existing devices due to the immutable BootROM. Qualcomm plans to fix the vulnerability in future chip designs. Users should enforce strict physical control over devices, avoid leaving them unattended especially during travel or repairs, and only use authorized service centers. Regular firmware updates should be applied to mitigate other vulnerabilities, though they do not fix this BootROM issue. Using security software such as Kaspersky for Android can help protect against other threats that might compound this vulnerability. If suspicious device behavior is observed (overheating, unusual network traffic, strange app activity), a full power cycle (removing or draining the battery) can remove the malicious code. Users should monitor official Qualcomm advisories for updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/qualcomm-cve-2026-25262/55811/","fetched":true,"fetchedAt":"2026-05-23T06:38:11.809Z","wordCount":1604}

Threat ID: 6a114b5409f6977edbc0dea0

Added to database: 5/23/2026, 6:38:12 AM

Last enriched: 5/23/2026, 6:38:20 AM

Last updated: 5/23/2026, 7:56:43 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses