Skip to main content

CVE-2025-20665: CWE-538 File and Directory Information Exposure in MediaTek, Inc. MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8196, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798, MT8893

Medium
VulnerabilityCVE-2025-20665cvecve-2025-20665cwe-538
Published: Mon May 05 2025 (05/05/2025, 02:49:18 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT6580, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8175, MT8195, MT8196, MT8321, MT8365, MT8370, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8796, MT8797, MT8798, MT8893

Description

In devinfo, there is a possible information disclosure due to a missing SELinux policy. This could lead to local information disclosure of device identifier with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09555228; Issue ID: MSV-2760.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:16:46 UTC

Technical Analysis

CVE-2025-20665 is a medium-severity vulnerability affecting a broad range of MediaTek chipsets, including models MT6580 through MT8893, which are integrated into numerous Android devices running versions 13.0, 14.0, and 15.0. The vulnerability arises from a missing SELinux policy in the 'devinfo' component, which leads to an information disclosure issue classified under CWE-538 (File and Directory Information Exposure). Specifically, this flaw allows a local attacker with limited privileges (low-level privileges) to access sensitive device identifiers without requiring any additional execution privileges or user interaction. The vulnerability does not impact the integrity or availability of the device but compromises confidentiality by exposing device-specific information that could be leveraged for device tracking, fingerprinting, or further targeted attacks. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector limited to local access, low attack complexity, and no user interaction required. Although no known exploits are currently in the wild, the wide range of affected chipsets and Android versions makes this a significant concern for devices using MediaTek hardware. The absence of a patch link in the provided data suggests that remediation may still be pending or in progress under the patch ID ALPS09555228 and issue ID MSV-2760. The root cause is the lack of an appropriate SELinux policy enforcement, which is critical in Android for sandboxing and restricting access to sensitive system components and files. This vulnerability highlights the importance of robust SELinux policy configurations in mobile device security architectures.

Potential Impact

For European organizations, the impact of CVE-2025-20665 primarily revolves around the potential exposure of device identifiers on Android devices powered by affected MediaTek chipsets. This exposure can facilitate device fingerprinting, user tracking, and targeted phishing or social engineering attacks. Organizations relying on mobile devices for sensitive communications, authentication, or as part of their operational technology may face increased risks of privacy violations and targeted attacks. While the vulnerability does not allow code execution or system compromise directly, the leakage of device identifiers can be a stepping stone for attackers to correlate device usage patterns or bypass certain security controls that rely on device identity. In sectors such as finance, healthcare, and government, where mobile device security is paramount, this vulnerability could undermine trust in device integrity and user privacy. Additionally, the vulnerability could be exploited by malicious insiders or attackers who gain local access to devices, emphasizing the need for strict access controls and device management policies. Given the widespread use of MediaTek chipsets in budget and mid-range smartphones popular in Europe, the scale of potential exposure is significant, especially in enterprises with bring-your-own-device (BYOD) policies or mobile workforce deployments.

Mitigation Recommendations

To mitigate CVE-2025-20665 effectively, European organizations should take a multi-layered approach beyond generic patching advice: 1) Monitor vendor communications closely for the release of the official SELinux policy patch (ALPS09555228) and prioritize timely deployment on all affected devices. 2) Implement strict mobile device management (MDM) policies that enforce device encryption, restrict installation of untrusted applications, and limit local access to device internals to reduce the attack surface. 3) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous local access attempts or privilege escalations on mobile devices. 4) Educate users about the risks of local device access and enforce strong authentication mechanisms such as biometrics or multi-factor authentication to prevent unauthorized physical or logical access. 5) For critical environments, consider restricting or isolating devices with affected MediaTek chipsets until patches are applied, especially if devices handle sensitive data or access critical systems. 6) Collaborate with device vendors and carriers to ensure that devices receive timely security updates and that SELinux policies are properly enforced in firmware and OS updates. 7) Conduct regular security audits and penetration testing focused on mobile device security to identify potential exploitation paths related to information disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.368Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6a2a

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:16:46 AM

Last updated: 8/11/2025, 4:26:06 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats