Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20723: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

0
High
VulnerabilityCVE-2025-20723cvecve-2025-20723cwe-787
Published: Tue Oct 14 2025 (10/14/2025, 09:11:50 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, MT8873

Description

In gnss driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09920033; Issue ID: MSV-3797.

AI-Powered Analysis

AILast updated: 10/21/2025, 11:46:01 UTC

Technical Analysis

CVE-2025-20723 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting the GNSS (Global Navigation Satellite System) driver in multiple MediaTek chipsets, including MT6835, MT6878, MT6886, MT6897, MT6899, MT6985, MT6989, MT6991, MT8676, MT8678, MT8775, MT8791T, MT8796, and MT8873. The root cause is an incorrect bounds check in the GNSS driver code, which allows an out-of-bounds write operation. This flaw can be exploited by a local attacker who already has System privileges on the device to escalate their privileges further, potentially gaining higher-level access or control over the device. The vulnerability does not require user interaction, increasing its risk in environments where an attacker has already compromised a system-level process or application. The affected products run Android versions 14.0 and 15.0, indicating that recent and upcoming devices using these MediaTek SoCs are vulnerable. The CVSS v3.1 score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is local, with low attack complexity and requiring low privileges but no user interaction, and the impact on confidentiality, integrity, and availability is high. Although no known exploits have been reported in the wild, the presence of a patch ID (ALPS09920033) suggests that MediaTek has addressed the issue internally. The vulnerability’s exploitation could allow attackers to manipulate GNSS driver memory, potentially leading to arbitrary code execution or system compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying on mobile devices or embedded systems using MediaTek chipsets, such as telecommunications, logistics, and IoT deployments. An attacker who gains System privileges on a device could leverage this flaw to escalate privileges further, potentially gaining root or kernel-level access. This could lead to unauthorized data access, device manipulation, or disruption of critical services. Given the GNSS driver’s role, manipulation could also affect location-based services, impacting applications dependent on accurate geolocation data. The vulnerability’s presence in Android 14 and 15 devices means that newer devices in use or deployment are at risk, increasing the attack surface. The lack of required user interaction facilitates stealthy exploitation in compromised environments. Although no exploits are currently known, the high CVSS score and broad chipset coverage necessitate proactive mitigation to prevent potential targeted attacks against European enterprises and government agencies.

Mitigation Recommendations

European organizations should prioritize updating affected devices to firmware or OS versions that include the MediaTek patch ALPS09920033 or subsequent security updates from device manufacturers. Network segmentation and strict access controls should be enforced to limit local access to devices, reducing the risk of attackers obtaining System privileges initially. Employ endpoint detection and response (EDR) solutions capable of monitoring for unusual privilege escalation attempts or anomalous GNSS driver behavior. Device inventory management should identify all assets using the affected MediaTek chipsets to ensure comprehensive patching. For IoT deployments, consider isolating vulnerable devices from critical networks until patched. Additionally, implement strict application whitelisting and privilege management to minimize the likelihood of initial System-level compromise. Monitoring for firmware updates from MediaTek and OEMs is essential to apply patches promptly. Finally, educate security teams about the potential for privilege escalation via device drivers to enhance incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.391Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee16317eab8b438c025d50

Added to database: 10/14/2025, 9:21:53 AM

Last enriched: 10/21/2025, 11:46:01 AM

Last updated: 12/1/2025, 3:36:52 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats