Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20730: CWE-287 Improper Authentication - Generic in MediaTek, Inc. MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, MT8696

0
Medium
VulnerabilityCVE-2025-20730cvecve-2025-20730cwe-287
Published: Tue Nov 04 2025 (11/04/2025, 06:19:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, MT8696

Description

In preloader, there is a possible escalation of privilege due to an insecure default value. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10068463; Issue ID: MSV-4141.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:22:07 UTC

Technical Analysis

CVE-2025-20730 is a vulnerability classified under CWE-287 (Improper Authentication) found in the preloader component of multiple MediaTek System on Chips (SoCs), including MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, and MT8696. These chipsets are widely used in Android smartphones (Android versions 13.0 to 16.0) and embedded Linux platforms such as openWRT (21.02, 23.05), Yocto 4.0, and RDK-B 24Q1. The vulnerability arises from an insecure default value in the preloader, which is a critical boot component responsible for initializing hardware and loading the main firmware. This insecure default allows a local attacker who already has System privilege to escalate their privileges further, potentially gaining full control over the device. The attack does not require user interaction but does require that the attacker has already compromised the system to a high privilege level (PR:H). The CVSS v3.1 score is 6.7 (medium severity), reflecting high impact on confidentiality, integrity, and availability, but limited by the requirement for existing high privileges and local access. No public exploits are known at this time, but the vulnerability poses a significant risk if chained with other exploits. The patch identifier ALPS10068463 addresses the issue, though no direct patch links are provided. This vulnerability is critical in environments where MediaTek SoCs are deployed in consumer devices, IoT, and embedded systems, as it can facilitate deeper system compromise and persistence by malicious actors.

Potential Impact

For European organizations, the impact of CVE-2025-20730 can be significant, especially for those relying on devices with MediaTek chipsets in smartphones, IoT devices, or embedded systems within critical infrastructure. Successful exploitation allows an attacker with existing system-level access to escalate privileges further, potentially gaining full control over affected devices. This could lead to unauthorized data access, manipulation, or disruption of services, impacting confidentiality, integrity, and availability. In sectors such as telecommunications, manufacturing, and smart city infrastructure, this could result in operational disruptions or data breaches. The requirement for local access and high privileges limits the attack surface but does not eliminate risk, particularly in environments where insider threats or chained exploits are possible. The vulnerability could also be leveraged to bypass security controls or implant persistent malware, complicating incident response and remediation efforts. Given the widespread use of MediaTek SoCs in consumer and industrial devices across Europe, the threat could affect a broad range of organizations if patches are not applied promptly.

Mitigation Recommendations

1. Apply vendor-supplied patches immediately once available, specifically the patch identified as ALPS10068463, to remediate the insecure default value in the preloader. 2. Restrict and monitor system-level access rigorously to prevent attackers from obtaining the initial System privilege required for exploitation. 3. Employ device integrity verification and secure boot mechanisms to detect unauthorized modifications at the preloader or firmware level. 4. Implement endpoint detection and response (EDR) solutions capable of identifying unusual privilege escalation attempts or suspicious local activity. 5. Conduct regular security audits and penetration testing focusing on privilege escalation vectors within devices using MediaTek chipsets. 6. For embedded and IoT deployments, ensure firmware updates are securely managed and devices are segmented within the network to limit lateral movement. 7. Educate internal teams about the risk of chained exploits that could leverage this vulnerability to deepen compromise. 8. Maintain an inventory of devices using affected MediaTek SoCs to prioritize patching and monitoring efforts effectively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.393Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f1c

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 11/11/2025, 7:22:07 AM

Last updated: 12/20/2025, 8:23:02 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats