Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20745: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920

0
Unknown
VulnerabilityCVE-2025-20745cvecve-2025-20745cwe-416
Published: Tue Nov 04 2025 (11/04/2025, 06:20:03 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920

Description

In apusys, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10095441; Issue ID: MSV-4294.

AI-Powered Analysis

AILast updated: 11/04/2025, 06:54:24 UTC

Technical Analysis

CVE-2025-20745 is a use-after-free vulnerability identified in the apusys component of MediaTek chipsets MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, and MT87920. These chipsets are integrated into Android devices running versions 13.0 through 15.0. The vulnerability arises from improper handling of memory, specifically a use-after-free condition (CWE-416), which can cause memory corruption. This corruption can be exploited by an attacker who already has System-level privileges on the device to escalate their privileges further, potentially gaining higher control or bypassing security restrictions. The exploit does not require any user interaction, increasing the risk of automated or stealthy attacks once initial access is obtained. However, the attacker must first have System privileges, which limits the initial attack surface. The vulnerability was reserved in November 2024 and published in November 2025, with no CVSS score assigned yet. MediaTek has acknowledged the issue internally (MSV-4294) and released a patch (ALPS10095441), though no public exploit code or active exploitation has been reported. The affected chipsets are widely used in various Android devices, including smartphones, tablets, and IoT devices, meaning the vulnerability could impact a broad range of hardware. The flaw’s exploitation could compromise device confidentiality and integrity by allowing privilege escalation, potentially enabling attackers to install persistent malware or manipulate sensitive data. The lack of user interaction requirement increases the risk once initial access is gained. The vulnerability’s scope is limited to devices with the affected MediaTek chipsets running the specified Android versions. The absence of a CVSS score necessitates a severity assessment based on impact and exploitation conditions.

Potential Impact

For European organizations, the primary impact of CVE-2025-20745 lies in the potential for local privilege escalation on devices using affected MediaTek chipsets. Organizations deploying Android devices with these chipsets—such as smartphones, tablets, or embedded IoT devices—could see compromised device integrity if attackers leverage this vulnerability after gaining System-level access. This could lead to unauthorized access to sensitive corporate data, disruption of device operations, or installation of persistent malware. The vulnerability does not allow remote exploitation without prior System privileges, which somewhat limits its immediate risk but does not eliminate it, especially in environments where devices may already be partially compromised or where insider threats exist. The lack of user interaction requirement means automated attacks could be feasible once initial access is obtained. This could affect sectors relying heavily on mobile or embedded devices, including telecommunications, manufacturing, healthcare, and critical infrastructure. Additionally, compromised devices could serve as footholds for lateral movement within corporate networks. The impact on availability is less direct but possible if attackers disrupt device functionality. Overall, the vulnerability poses a significant risk to confidentiality and integrity of affected devices within European organizations, necessitating prompt mitigation.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Identify all devices using the affected MediaTek chipsets (MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920) running Android 13.0 to 15.0 within their environment. 2) Coordinate with device vendors and manufacturers to obtain and deploy the official patches corresponding to MediaTek’s ALPS10095441 update as soon as they become available. 3) Implement strict access controls and monitoring to prevent unauthorized escalation to System privileges, including limiting administrative access and employing endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. 4) Conduct regular security audits and vulnerability assessments focusing on mobile and embedded devices to detect signs of compromise or exploitation attempts. 5) Employ network segmentation to isolate critical devices and limit lateral movement in case of device compromise. 6) Educate IT and security teams about this vulnerability’s specifics to enhance incident response readiness. 7) Monitor threat intelligence feeds for any emerging exploit code or active exploitation campaigns targeting this vulnerability. 8) Consider deploying runtime application self-protection (RASP) or similar technologies on critical devices to detect anomalous memory corruption behaviors. 9) For high-risk environments, evaluate the feasibility of temporarily restricting use of affected devices until patches are applied. These measures go beyond generic advice by focusing on device inventory, patch coordination, privilege management, and proactive detection tailored to the vulnerability’s characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1aad66f5e62e384935a

Added to database: 11/4/2025, 6:48:10 AM

Last enriched: 11/4/2025, 6:54:24 AM

Last updated: 11/4/2025, 12:26:58 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats