Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32626: Elevation of Privilege in MediaTek, Inc. MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8365, MT8766, MT8781, MT8791

0
Medium
Published: Mon Dec 05 2022 (12/05/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8365, MT8766, MT8781, MT8791

Description

In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326239; Issue ID: ALPS07326239.

AI-Powered Analysis

AILast updated: 06/24/2025, 04:56:09 UTC

Technical Analysis

CVE-2022-32626 is a medium-severity elevation of privilege vulnerability affecting multiple MediaTek SoCs (System on Chips) including MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8168, MT8365, MT8766, MT8781, and MT8791. These chips are widely used in Android smartphones running Android versions 11 and 12. The vulnerability arises from an out-of-bounds write in the display component due to an incorrect bounds check. This flaw allows a local attacker with system execution privileges to escalate their privileges further without requiring any user interaction. The vulnerability is classified under CWE-787 (Out-of-bounds Write), which can lead to memory corruption, potentially allowing arbitrary code execution or system compromise. Exploitation requires the attacker to have system-level execution privileges initially, indicating that this is not a remote or initial access vulnerability but rather one that can be leveraged to gain higher privileges once some level of access is already obtained. The CVSS v3.1 score is 6.7 (medium), reflecting the complexity of exploitation (low attack vector, requiring local access and high privileges) but high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported, and no official patches are linked in the provided data, though MediaTek has assigned a patch ID (ALPS07326239) indicating a patch likely exists or is in development. The vulnerability affects a broad range of MediaTek chipsets commonly found in mid-range to budget Android devices, making it relevant for a large user base.

Potential Impact

For European organizations, the impact of CVE-2022-32626 depends largely on the deployment of devices using the affected MediaTek chipsets. Many enterprises and government agencies use Android devices for communication and operational purposes, including smartphones and tablets with MediaTek SoCs. Successful exploitation could allow an attacker who has already gained system-level access on a device to escalate privileges further, potentially leading to full device compromise. This could result in unauthorized access to sensitive corporate or governmental data, manipulation of device functions, or use of the device as a pivot point for lateral movement within networks. The vulnerability does not require user interaction, increasing the risk once initial access is achieved. However, since exploitation requires system execution privileges, the initial compromise vector must be addressed to prevent privilege escalation chains. The widespread use of MediaTek chips in consumer and enterprise devices in Europe means that sectors relying on mobile communications, such as finance, healthcare, and public administration, could be at risk if devices are not patched. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations if combined with other exploits.

Mitigation Recommendations

1. Immediate deployment of security patches from device manufacturers or MediaTek is critical. Organizations should liaise with device vendors to confirm patch availability and schedule updates. 2. Implement strict mobile device management (MDM) policies that restrict installation of untrusted applications and enforce least privilege principles to minimize the chance of initial system-level access. 3. Monitor devices for signs of privilege escalation or abnormal behavior, such as unexpected system process activity or unauthorized access attempts. 4. Employ endpoint detection and response (EDR) solutions capable of detecting exploitation attempts or memory corruption indicators on Android devices. 5. Educate users and administrators about the risks of sideloading apps or rooting devices, which can increase the likelihood of initial system-level compromise. 6. For high-security environments, consider restricting or isolating devices with affected MediaTek chipsets until patches are applied. 7. Regularly audit device inventories to identify and track devices with vulnerable chipsets and Android versions 11 or 12. 8. Collaborate with vendors to obtain detailed patch deployment timelines and verify patch integrity post-installation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2022-06-09T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf10e1

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 4:56:09 AM

Last updated: 2/7/2026, 9:32:53 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats