CERT-In Issues High-Severity Warning for MediaTek Devices: Urges Immediate Security Updates

Share via:

The Indian Computer Emergency Response Team (CERT-In) has issued a high-severity alert warning users about critical vulnerabilities found in devices powered by MediaTek chipsets, including smartphones, laptops, smart TVs, tablets, and Wi-Fi routers. These flaws, caused by issues such as heap overflows, improper WLAN authentication, and Bluetooth-related bugs, could allow attackers to gain elevated access, steal sensitive data, or disable the device. CERT-In urges users to immediately install the latest firmware or software updates and reboot their devices to activate the fixes. The warning comes amid growing concerns over the widespread use of MediaTek processors in India and the potential risks of unpatched security loopholes.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Popular

More Like this

CERT-In Issues High-Severity Warning for MediaTek Devices: Urges Immediate Security Updates

The Indian Computer Emergency Response Team (CERT-In) has issued a high-severity alert warning users about critical vulnerabilities found in devices powered by MediaTek chipsets, including smartphones, laptops, smart TVs, tablets, and Wi-Fi routers. These flaws, caused by issues such as heap overflows, improper WLAN authentication, and Bluetooth-related bugs, could allow attackers to gain elevated access, steal sensitive data, or disable the device. CERT-In urges users to immediately install the latest firmware or software updates and reboot their devices to activate the fixes. The warning comes amid growing concerns over the widespread use of MediaTek processors in India and the potential risks of unpatched security loopholes.

Disclaimer

We strive to uphold the highest ethical standards in all of our reporting and coverage. We StartupNews.fyi want to be transparent with our readers about any potential conflicts of interest that may arise in our work. It’s possible that some of the investors we feature may have connections to other businesses, including competitors or companies we write about. However, we want to assure our readers that this will not have any impact on the integrity or impartiality of our reporting. We are committed to delivering accurate, unbiased news and information to our audience, and we will continue to uphold our ethics and principles in all of our work. Thank you for your trust and support.

Website Upgradation is going on for any glitch kindly connect at office@startupnews.fyi

More like this

IPO-bound PhonePe, Google Pay maintain UPI ecosystem dominance in...

Digital payments majors PhonePe and Google Pay continued...

WWDC25 ends today, did it meet your expectations?

Today marks the last day of WWDC25 and,...

Price Band Set At INR 210-222

SUMMARY At the upper end of the price band,...

Popular

Upcoming Events

sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf sgsdfsdf asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas asdas