Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20705: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT2735, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8169, MT8186, MT8188, MT8676, MT8678, MT8696, MT8775, MT8792, MT8796

0
High
VulnerabilityCVE-2025-20705cvecve-2025-20705cwe-416
Published: Mon Sep 01 2025 (09/01/2025, 05:12:21 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT2735, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8169, MT8186, MT8188, MT8676, MT8678, MT8696, MT8775, MT8792, MT8796

Description

In monitor_hang, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09989078; Issue ID: MSV-3964.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:43:50 UTC

Technical Analysis

CVE-2025-20705 is a high-severity use-after-free vulnerability (CWE-416) affecting a broad range of MediaTek SoCs (System on Chips), including MT2718, MT2735, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8169, MT8186, MT8188, MT8676, MT8678, MT8696, MT8775, MT8792, and MT8796. The vulnerability resides in the 'monitor_hang' component, where improper handling of memory leads to use-after-free conditions, potentially causing memory corruption. Exploitation of this flaw could enable a local attacker, who already possesses System-level privileges, to escalate their privileges further, potentially gaining higher integrity or control over the system. Notably, exploitation does not require any user interaction, increasing the risk in environments where an attacker has local access. The affected platforms include Android versions 13.0 through 16.0, as well as openWRT versions 19.07 and 21.02, and Yocto 2.6, indicating that a wide range of embedded and mobile devices using these MediaTek chips are vulnerable. The CVSS v3.1 base score is 7.8, reflecting high severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access with low complexity, requires low privileges, no user interaction, and impacts confidentiality, integrity, and availability at a high level. Although no known exploits are currently reported in the wild, the vulnerability's nature and broad affected product range make it a significant concern for device manufacturers and users relying on MediaTek hardware. The patch identifier ALPS09989078 and issue ID MSV-3964 have been assigned, but no direct patch links are provided in the data. Overall, this vulnerability represents a critical risk for embedded and mobile devices using these MediaTek SoCs, especially in scenarios where an attacker has already compromised system-level access and seeks to further escalate privileges or maintain persistence.

Potential Impact

For European organizations, this vulnerability poses a substantial risk primarily in sectors relying on embedded devices, IoT infrastructure, mobile devices, and network equipment powered by MediaTek chipsets. Telecommunications providers, smart city infrastructure, industrial control systems, and consumer electronics manufacturers in Europe may be affected due to the widespread use of MediaTek SoCs in smartphones, routers, and IoT devices. The ability to escalate privileges locally without user interaction means that if an attacker gains initial system-level access—potentially through other vulnerabilities or insider threats—they could exploit this flaw to gain deeper control, potentially leading to data breaches, service disruptions, or unauthorized control of critical systems. The impact on confidentiality, integrity, and availability is high, which could result in leakage of sensitive information, unauthorized modification of system configurations, or denial of service conditions. Given the inclusion of openWRT and Yocto platforms, network devices such as routers and gateways used in enterprise and industrial environments are also at risk, potentially affecting network security and operational continuity. The lack of known exploits in the wild currently provides a window for mitigation, but the vulnerability's characteristics suggest it could be targeted in the future, especially in high-value environments.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Immediate identification and inventory of devices using the affected MediaTek chipsets and running the specified vulnerable OS versions (Android 13-16, openWRT 19.07/21.02, Yocto 2.6). 2) Apply vendor-supplied patches as soon as they become available; coordinate with device manufacturers and MediaTek for firmware updates referencing patch ID ALPS09989078 and issue MSV-3964. 3) For devices where patches are not yet available or cannot be applied, implement network segmentation and strict access controls to limit local access to vulnerable devices, reducing the risk of local exploitation. 4) Enhance monitoring and logging on affected devices to detect unusual privilege escalations or memory corruption indicators. 5) Employ endpoint detection and response (EDR) solutions capable of identifying anomalous behavior consistent with use-after-free exploitation. 6) Conduct security awareness and operational training for administrators managing embedded and IoT devices to recognize and respond to potential exploitation attempts. 7) Where feasible, consider device replacement or upgrading to hardware platforms not affected by this vulnerability, especially in critical infrastructure. 8) Collaborate with supply chain partners to ensure timely updates and vulnerability management for MediaTek-based devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc24

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 9/8/2025, 6:43:50 AM

Last updated: 10/18/2025, 7:02:16 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats