Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20722: CWE-190 Integer Overflow in MediaTek, Inc. MT6835, MT6878, MT6886, MT6897, MT6899, MT6980D, MT6985, MT6989, MT6990, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

0
Medium
VulnerabilityCVE-2025-20722cvecve-2025-20722cwe-190
Published: Tue Oct 14 2025 (10/14/2025, 09:11:48 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6835, MT6878, MT6886, MT6897, MT6899, MT6980D, MT6985, MT6989, MT6990, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

Description

CVE-2025-20722 is an integer overflow vulnerability in the GNSS driver of multiple MediaTek chipsets, including MT6835 through MT8873. The flaw allows a local attacker with system privileges to perform an out-of-bounds read, potentially leading to information disclosure. Exploitation does not require user interaction but does require prior system-level access. The vulnerability affects devices running Android 14. 0 and 15. 0, openWRT 21. 02 and 23. 05, and RDKB 24Q1. Although no known exploits are currently in the wild, the medium severity CVSS score of 5. 5 reflects the significant confidentiality impact but limited integrity and availability effects.

AI-Powered Analysis

AILast updated: 10/21/2025, 12:04:26 UTC

Technical Analysis

CVE-2025-20722 is a medium-severity integer overflow vulnerability identified in the GNSS (Global Navigation Satellite System) driver component of a broad range of MediaTek chipsets, including MT6835, MT6878, MT6886, MT6897, MT6899, MT6980D, MT6985, MT6989, MT6990, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, and MT8873. The root cause is an integer overflow that leads to an out-of-bounds read operation within the GNSS driver code. This vulnerability can be exploited by a malicious actor who already possesses system-level privileges on the affected device, enabling them to read memory beyond intended boundaries. The consequence is local information disclosure, potentially leaking sensitive data stored in memory. Exploitation does not require user interaction, increasing the risk if system privileges are compromised. The affected platforms include Android versions 14.0 and 15.0, openWRT versions 21.02 and 23.05, and RDKB 24Q1, indicating a wide range of devices from smartphones to embedded routers and IoT devices. The CVSS v3.1 base score is 5.5 (medium), reflecting the vulnerability's moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, but the vulnerability's presence in widely deployed chipsets necessitates timely remediation. The patch identifier ALPS09920036 and issue ID MSV-3798 correspond to the vendor's fix efforts. Given the requirement for system privileges, the vulnerability is less likely to be exploited remotely but remains a concern in scenarios where local privilege escalation has already occurred.

Potential Impact

For European organizations, the primary impact of CVE-2025-20722 lies in the potential exposure of sensitive information through local memory disclosure on devices using affected MediaTek chipsets. Telecommunications providers, mobile device manufacturers, and IoT infrastructure operators in Europe are at risk, as many consumer and enterprise devices incorporate these chipsets. The vulnerability could facilitate further attacks if combined with privilege escalation exploits, undermining confidentiality and possibly enabling lateral movement within networks. The affected platforms include Android smartphones, embedded routers running openWRT, and broadband gateway devices using RDKB, all common in European markets. Information disclosure could lead to leakage of cryptographic keys, user data, or proprietary information, impacting privacy compliance under GDPR and other regulations. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of leaked information could be severe, including espionage, fraud, or targeted attacks. The lack of user interaction requirement increases risk in environments where system privileges are already compromised. Therefore, European organizations must consider this vulnerability in their risk assessments and incident response planning.

Mitigation Recommendations

1. Apply vendor-supplied patches immediately once available, specifically the update identified by patch ID ALPS09920036. 2. Restrict system-level privileges rigorously to minimize the risk of local attackers gaining the necessary access to exploit this vulnerability. 3. Implement strict access controls and monitoring on devices running affected MediaTek chipsets, especially those in critical infrastructure or enterprise environments. 4. Conduct regular security audits and vulnerability scans on embedded devices and mobile endpoints to detect outdated firmware or unpatched software. 5. Employ runtime protections such as memory protection mechanisms (e.g., ASLR, DEP) to reduce the impact of out-of-bounds reads. 6. Monitor logs and system behavior for unusual local activity that could indicate attempts to exploit this vulnerability or escalate privileges. 7. Educate IT and security teams about the specific risk posed by this vulnerability to ensure rapid response and containment. 8. For organizations deploying openWRT or RDKB-based devices, coordinate with vendors and suppliers to ensure timely firmware updates. 9. Consider network segmentation to isolate vulnerable devices and limit potential lateral movement in case of compromise. 10. Maintain an inventory of devices using affected MediaTek chipsets to prioritize patching and risk management efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.391Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d4d

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/21/2025, 12:04:26 PM

Last updated: 12/3/2025, 6:54:43 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats