CVE-2025-20650: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061.
AI Analysis
Technical Summary
CVE-2025-20650 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek chipsets including MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, and MT8678. The flaw exists in the 'da' component where a missing bounds check allows an out-of-bounds write operation. This vulnerability can be exploited locally by an attacker with physical access to the device and requires user interaction, but no additional execution privileges are necessary. The affected platforms include devices running Android versions 13.0 through 15.0, openWRT 21.02 and 23.05, Yocto 4.0, and RDK-B 22Q3 and 24Q1, indicating a wide range of embedded and consumer devices. The out-of-bounds write can lead to local escalation of privilege, potentially allowing an attacker to execute arbitrary code or disrupt system operations, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 6.8, reflecting medium severity with high impact on all security properties but limited by the requirement for physical access and user interaction. No known exploits have been reported in the wild yet. The issue has been assigned patch ID ALPS09291294 and issue ID MSV-2061 by MediaTek, but no public patch links are currently available. This vulnerability highlights the risks inherent in embedded system software and the critical need for bounds checking in memory operations.
Potential Impact
The primary impact of CVE-2025-20650 is local privilege escalation on affected devices, which can compromise the confidentiality, integrity, and availability of the system. An attacker with physical access and the ability to interact with the device could exploit this vulnerability to gain higher privileges, potentially leading to unauthorized access to sensitive data, modification of system files, or disruption of device functionality. This could affect consumer smartphones, IoT devices, and embedded systems utilizing the vulnerable MediaTek chipsets. The broad range of affected platforms increases the scope of impact, especially in environments where devices are physically accessible by untrusted individuals. Although remote exploitation is not possible, the vulnerability poses a risk in scenarios such as device theft, insider threats, or shared device environments. The absence of known exploits in the wild currently limits immediate widespread impact, but the medium severity rating suggests that timely mitigation is important to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-20650, organizations and users should: 1) Apply official patches from MediaTek or device manufacturers as soon as they become available, referencing patch ID ALPS09291294. 2) Restrict physical access to devices containing affected MediaTek chipsets, especially in high-risk environments. 3) Implement device-level security controls such as strong authentication and lock screens to reduce the likelihood of unauthorized user interaction. 4) Monitor for firmware updates from vendors supporting Android, openWRT, Yocto, and RDK-B platforms that include fixes for this vulnerability. 5) Employ hardware security modules or trusted execution environments where possible to limit the impact of local privilege escalations. 6) Educate users about the risks of physical device access and the importance of not interacting with suspicious prompts or requests. 7) For organizations deploying embedded systems, conduct regular security audits and penetration testing focusing on physical access scenarios. These steps go beyond generic advice by emphasizing physical security, user interaction controls, and proactive patch management tailored to embedded device ecosystems.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Indonesia, Vietnam, Taiwan, Malaysia
CVE-2025-20650: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678
Description
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291294; Issue ID: MSV-2061.
AI-Powered Analysis
Technical Analysis
CVE-2025-20650 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek chipsets including MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, and MT8678. The flaw exists in the 'da' component where a missing bounds check allows an out-of-bounds write operation. This vulnerability can be exploited locally by an attacker with physical access to the device and requires user interaction, but no additional execution privileges are necessary. The affected platforms include devices running Android versions 13.0 through 15.0, openWRT 21.02 and 23.05, Yocto 4.0, and RDK-B 22Q3 and 24Q1, indicating a wide range of embedded and consumer devices. The out-of-bounds write can lead to local escalation of privilege, potentially allowing an attacker to execute arbitrary code or disrupt system operations, impacting confidentiality, integrity, and availability. The CVSS v3.1 score is 6.8, reflecting medium severity with high impact on all security properties but limited by the requirement for physical access and user interaction. No known exploits have been reported in the wild yet. The issue has been assigned patch ID ALPS09291294 and issue ID MSV-2061 by MediaTek, but no public patch links are currently available. This vulnerability highlights the risks inherent in embedded system software and the critical need for bounds checking in memory operations.
Potential Impact
The primary impact of CVE-2025-20650 is local privilege escalation on affected devices, which can compromise the confidentiality, integrity, and availability of the system. An attacker with physical access and the ability to interact with the device could exploit this vulnerability to gain higher privileges, potentially leading to unauthorized access to sensitive data, modification of system files, or disruption of device functionality. This could affect consumer smartphones, IoT devices, and embedded systems utilizing the vulnerable MediaTek chipsets. The broad range of affected platforms increases the scope of impact, especially in environments where devices are physically accessible by untrusted individuals. Although remote exploitation is not possible, the vulnerability poses a risk in scenarios such as device theft, insider threats, or shared device environments. The absence of known exploits in the wild currently limits immediate widespread impact, but the medium severity rating suggests that timely mitigation is important to prevent future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-20650, organizations and users should: 1) Apply official patches from MediaTek or device manufacturers as soon as they become available, referencing patch ID ALPS09291294. 2) Restrict physical access to devices containing affected MediaTek chipsets, especially in high-risk environments. 3) Implement device-level security controls such as strong authentication and lock screens to reduce the likelihood of unauthorized user interaction. 4) Monitor for firmware updates from vendors supporting Android, openWRT, Yocto, and RDK-B platforms that include fixes for this vulnerability. 5) Employ hardware security modules or trusted execution environments where possible to limit the impact of local privilege escalations. 6) Educate users about the risks of physical device access and the importance of not interacting with suspicious prompts or requests. 7) For organizations deploying embedded systems, conduct regular security audits and penetration testing focusing on physical access scenarios. These steps go beyond generic advice by emphasizing physical security, user interaction controls, and proactive patch management tailored to embedded device ecosystems.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.366Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a44d85912abc71d6525a
Added to database: 2/26/2026, 7:51:41 PM
Last enriched: 2/26/2026, 8:47:02 PM
Last updated: 2/26/2026, 11:17:44 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.