CVE-2025-20665: CWE-538 File and Directory Information Exposure in MediaTek, Inc. MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8196, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798, MT8893
In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760.
AI Analysis
Technical Summary
CVE-2025-20665 is a medium-severity vulnerability affecting a broad range of MediaTek chipsets, including models MT6580 through MT8893, which are integrated into numerous Android devices running versions 13.0, 14.0, and 15.0. The vulnerability arises from a missing SELinux policy in the 'devinfo' component, which leads to an information disclosure issue classified under CWE-538 (File and Directory Information Exposure). Specifically, this flaw allows a local attacker with limited privileges (low-level privileges) to access sensitive device identifiers without requiring any additional execution privileges or user interaction. The vulnerability does not impact the integrity or availability of the device but compromises confidentiality by exposing device-specific information that could be leveraged for device tracking, fingerprinting, or further targeted attacks. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector limited to local access, low attack complexity, and no user interaction required. Although no known exploits are currently in the wild, the wide range of affected chipsets and Android versions makes this a significant concern for devices using MediaTek hardware. The absence of a patch link in the provided data suggests that remediation may still be pending or in progress under the patch ID ALPS09555228 and issue ID MSV-2760. The root cause is the lack of an appropriate SELinux policy enforcement, which is critical in Android for sandboxing and restricting access to sensitive system components and files. This vulnerability highlights the importance of robust SELinux policy configurations in mobile device security architectures.
Potential Impact
For European organizations, the impact of CVE-2025-20665 primarily revolves around the potential exposure of device identifiers on Android devices powered by affected MediaTek chipsets. This exposure can facilitate device fingerprinting, user tracking, and targeted phishing or social engineering attacks. Organizations relying on mobile devices for sensitive communications, authentication, or as part of their operational technology may face increased risks of privacy violations and targeted attacks. While the vulnerability does not allow code execution or system compromise directly, the leakage of device identifiers can be a stepping stone for attackers to correlate device usage patterns or bypass certain security controls that rely on device identity. In sectors such as finance, healthcare, and government, where mobile device security is paramount, this vulnerability could undermine trust in device integrity and user privacy. Additionally, the vulnerability could be exploited by malicious insiders or attackers who gain local access to devices, emphasizing the need for strict access controls and device management policies. Given the widespread use of MediaTek chipsets in budget and mid-range smartphones popular in Europe, the scale of potential exposure is significant, especially in enterprises with bring-your-own-device (BYOD) policies or mobile workforce deployments.
Mitigation Recommendations
To mitigate CVE-2025-20665 effectively, European organizations should take a multi-layered approach beyond generic patching advice: 1) Monitor vendor communications closely for the release of the official SELinux policy patch (ALPS09555228) and prioritize timely deployment on all affected devices. 2) Implement strict mobile device management (MDM) policies that enforce device encryption, restrict installation of untrusted applications, and limit local access to device internals to reduce the attack surface. 3) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous local access attempts or privilege escalations on mobile devices. 4) Educate users about the risks of local device access and enforce strong authentication mechanisms such as biometrics or multi-factor authentication to prevent unauthorized physical or logical access. 5) For critical environments, consider restricting or isolating devices with affected MediaTek chipsets until patches are applied, especially if devices handle sensitive data or access critical systems. 6) Collaborate with device vendors and carriers to ensure that devices receive timely security updates and that SELinux policies are properly enforced in firmware and OS updates. 7) Conduct regular security audits and penetration testing focused on mobile device security to identify potential exploitation paths related to information disclosure.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2025-20665: CWE-538 File and Directory Information Exposure in MediaTek, Inc. MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8196, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798, MT8893
Description
In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760.
AI-Powered Analysis
Technical Analysis
CVE-2025-20665 is a medium-severity vulnerability affecting a broad range of MediaTek chipsets, including models MT6580 through MT8893, which are integrated into numerous Android devices running versions 13.0, 14.0, and 15.0. The vulnerability arises from a missing SELinux policy in the 'devinfo' component, which leads to an information disclosure issue classified under CWE-538 (File and Directory Information Exposure). Specifically, this flaw allows a local attacker with limited privileges (low-level privileges) to access sensitive device identifiers without requiring any additional execution privileges or user interaction. The vulnerability does not impact the integrity or availability of the device but compromises confidentiality by exposing device-specific information that could be leveraged for device tracking, fingerprinting, or further targeted attacks. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector limited to local access, low attack complexity, and no user interaction required. Although no known exploits are currently in the wild, the wide range of affected chipsets and Android versions makes this a significant concern for devices using MediaTek hardware. The absence of a patch link in the provided data suggests that remediation may still be pending or in progress under the patch ID ALPS09555228 and issue ID MSV-2760. The root cause is the lack of an appropriate SELinux policy enforcement, which is critical in Android for sandboxing and restricting access to sensitive system components and files. This vulnerability highlights the importance of robust SELinux policy configurations in mobile device security architectures.
Potential Impact
For European organizations, the impact of CVE-2025-20665 primarily revolves around the potential exposure of device identifiers on Android devices powered by affected MediaTek chipsets. This exposure can facilitate device fingerprinting, user tracking, and targeted phishing or social engineering attacks. Organizations relying on mobile devices for sensitive communications, authentication, or as part of their operational technology may face increased risks of privacy violations and targeted attacks. While the vulnerability does not allow code execution or system compromise directly, the leakage of device identifiers can be a stepping stone for attackers to correlate device usage patterns or bypass certain security controls that rely on device identity. In sectors such as finance, healthcare, and government, where mobile device security is paramount, this vulnerability could undermine trust in device integrity and user privacy. Additionally, the vulnerability could be exploited by malicious insiders or attackers who gain local access to devices, emphasizing the need for strict access controls and device management policies. Given the widespread use of MediaTek chipsets in budget and mid-range smartphones popular in Europe, the scale of potential exposure is significant, especially in enterprises with bring-your-own-device (BYOD) policies or mobile workforce deployments.
Mitigation Recommendations
To mitigate CVE-2025-20665 effectively, European organizations should take a multi-layered approach beyond generic patching advice: 1) Monitor vendor communications closely for the release of the official SELinux policy patch (ALPS09555228) and prioritize timely deployment on all affected devices. 2) Implement strict mobile device management (MDM) policies that enforce device encryption, restrict installation of untrusted applications, and limit local access to device internals to reduce the attack surface. 3) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous local access attempts or privilege escalations on mobile devices. 4) Educate users about the risks of local device access and enforce strong authentication mechanisms such as biometrics or multi-factor authentication to prevent unauthorized physical or logical access. 5) For critical environments, consider restricting or isolating devices with affected MediaTek chipsets until patches are applied, especially if devices handle sensitive data or access critical systems. 6) Collaborate with device vendors and carriers to ensure that devices receive timely security updates and that SELinux policies are properly enforced in firmware and OS updates. 7) Conduct regular security audits and penetration testing focused on mobile device security to identify potential exploitation paths related to information disclosure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6a2a
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:16:46 AM
Last updated: 8/11/2025, 4:26:06 AM
Views: 18
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.