Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20723: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

0
High
VulnerabilityCVE-2025-20723cvecve-2025-20723cwe-787
Published: Tue Oct 14 2025 (10/14/2025, 09:11:50 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

Description

In gnss driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920033; Issue ID: MSV-3797.

AI-Powered Analysis

AILast updated: 10/14/2025, 09:38:24 UTC

Technical Analysis

CVE-2025-20723 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in the GNSS (Global Navigation Satellite System) driver of multiple MediaTek chipsets, including MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, and MT8873. These chipsets are integrated into various Android devices running versions 14.0 and 15.0. The vulnerability stems from an incorrect bounds check in the GNSS driver code, which can lead to writing data outside the intended memory boundaries. This out-of-bounds write can corrupt memory, potentially allowing an attacker who already has System-level privileges on the device to escalate their privileges further, possibly gaining higher-level kernel privileges or executing arbitrary code. Exploitation does not require user interaction, meaning that once an attacker has local System access, they can exploit this vulnerability without additional user actions. The flaw does not appear to be remotely exploitable and requires local access at the System privilege level, which limits the initial attack vector but increases the risk of post-compromise escalation. No known public exploits or active exploitation have been reported as of the publication date. The vendor has assigned a patch ID (ALPS09920033) and an internal issue ID (MSV-3797), indicating that a fix is planned or available. The vulnerability affects a broad range of MediaTek SoCs, which are widely used in mid-range and some high-end mobile devices globally. The lack of a CVSS score necessitates an independent severity assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, the primary impact of CVE-2025-20723 lies in the potential for local privilege escalation on devices using affected MediaTek chipsets. This could compromise the confidentiality, integrity, and availability of sensitive data on mobile devices, especially those used in corporate environments or critical infrastructure sectors. Attackers who gain System-level access—via other vulnerabilities, malware, or insider threats—could leverage this flaw to gain deeper control over the device, bypass security controls, or persist undetected. This is particularly concerning for sectors relying heavily on mobile communications and location services, such as logistics, transportation, emergency services, and government agencies. The vulnerability could also affect the stability and reliability of devices, potentially causing crashes or erratic behavior. Given the widespread use of MediaTek chipsets in consumer and enterprise mobile devices across Europe, the risk extends to a large user base. However, the requirement for local System privileges limits the likelihood of remote exploitation, reducing the immediate threat to large-scale network compromise. Nonetheless, targeted attacks against high-value individuals or organizations remain plausible. The absence of known exploits in the wild provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Apply vendor patches promptly: Monitor MediaTek and device manufacturers for the release of security updates addressing CVE-2025-20723 and deploy them as soon as they become available. 2. Restrict local System-level access: Enforce strict access controls on devices to limit System privilege usage to trusted administrators and processes only. 3. Harden device security: Utilize mobile device management (MDM) solutions to enforce security policies, including disabling unnecessary services and restricting installation of untrusted applications. 4. Monitor for suspicious activity: Implement endpoint detection and response (EDR) tools capable of identifying unusual privilege escalation attempts or memory corruption indicators on affected devices. 5. Educate users and administrators: Raise awareness about the risks of privilege escalation vulnerabilities and the importance of maintaining updated software. 6. Network segmentation: Isolate critical devices and sensitive data environments to reduce the impact of a compromised device. 7. Conduct regular security audits: Periodically review device configurations and access logs to detect potential misuse of System privileges. 8. Limit exposure: Where feasible, avoid deploying devices with affected MediaTek chipsets in high-risk or sensitive operational environments until patched.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.391Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d50

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/14/2025, 9:38:24 AM

Last updated: 10/16/2025, 1:23:30 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats