Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20763: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793, MT8796, MT8873, MT8893

0
High
VulnerabilityCVE-2025-20763cvecve-2025-20763cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 02:34:25 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793, MT8796, MT8873, MT8893

Description

In mmdvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10267218; Issue ID: MSV-5032.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:26:09 UTC

Technical Analysis

CVE-2025-20763 is an out-of-bounds write vulnerability classified under CWE-787 found in the mmdvfs (MediaTek Dynamic Voltage and Frequency Scaling) component of MediaTek chipsets, specifically affecting a wide range of MT series processors including MT6833 through MT8893. The vulnerability arises due to a missing bounds check in the mmdvfs code, which allows a local attacker with System-level privileges to perform an out-of-bounds write operation. This memory corruption can lead to escalation of privileges beyond the System level, potentially compromising confidentiality, integrity, and availability of the affected device. The flaw does not require user interaction for exploitation, increasing its risk profile. The affected devices run Android versions 14.0, 15.0, and 16.0, indicating that recent and upcoming devices are vulnerable. Despite no known exploits currently in the wild, the vulnerability's characteristics and high CVSS score (7.8) highlight the potential for impactful exploitation. The issue was reserved in November 2024 and published in December 2025, with patches identified by MediaTek under ALPS10267218 and issue ID MSV-5032. The vulnerability requires local access with at least System privileges, which suggests that attackers must already have some foothold on the device to leverage this flaw for privilege escalation. The broad range of affected chipsets indicates a widespread impact across many device models using MediaTek SoCs, commonly found in mid-range and budget smartphones globally.

Potential Impact

For European organizations, the impact of CVE-2025-20763 can be significant, especially those relying on mobile devices with MediaTek chipsets for business operations, secure communications, or sensitive data handling. Successful exploitation could allow attackers who have already compromised a device at the System level to escalate privileges further, potentially gaining root or kernel-level access. This could lead to unauthorized access to sensitive corporate data, installation of persistent malware, or disruption of device functionality. The vulnerability affects confidentiality by enabling access to protected information, integrity by allowing unauthorized code execution or modification, and availability by potentially causing system crashes or denial of service. Given the prevalence of Android devices with MediaTek chips in Europe, especially in sectors like finance, healthcare, and government where mobile security is critical, the risk is non-trivial. Additionally, the lack of user interaction requirement means that once local access is obtained, exploitation can be automated or triggered silently, increasing the threat to organizational security. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity demands urgent patching and monitoring.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the out-of-bounds write vulnerability in mmdvfs. 2. Restrict local access to devices by enforcing strong authentication and limiting physical and remote access to trusted personnel only. 3. Implement mobile device management (MDM) solutions to enforce security policies, monitor device integrity, and deploy updates promptly. 4. Conduct regular security audits and vulnerability assessments on mobile devices used within the organization to detect signs of compromise or privilege escalation attempts. 5. Employ runtime protection mechanisms such as exploit mitigation technologies (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported by the device. 6. Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of applying updates. 7. Monitor system logs and behavior for anomalies indicative of exploitation attempts, such as unexpected privilege changes or memory corruption events. 8. For high-risk environments, consider isolating critical applications or data from devices with MediaTek chipsets until patches are confirmed applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b1f2f793a7de7f5f69

Added to database: 12/2/2025, 3:06:25 AM

Last enriched: 12/9/2025, 4:26:09 AM

Last updated: 1/19/2026, 5:11:44 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats