URL has been copied successfully!
Fenrir PoC Breaks Secure Boot on Nothing Phone (2a) and CMF Phone 1
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Fenrir PoC Breaks Secure Boot on Nothing Phone (2a) and CMF Phone 1

A newly released proof-of-concept (PoC) exploit has disclosed a severe code-execution vulnerability affecting the Nothing Phone (2a) and the CMF Phone 1, both of which are powered by MediaTek chipsets. The exploit, named “fenrir”, compromises the secure boot process, allowing attackers to execute arbitrary code at EL3, the most privileged level in the ARM architecture.

First seen on thecyberexpress.com

Jump to article: thecyberexpress.com/fenrir-poc-for-nothing-phone-2a-cmf1/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link