Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20765: CWE-415 Double Free in MediaTek, Inc. MT2718, MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8113, MT8115, MT8139, MT8163, MT8168, MT8169, MT8183, MT8186, MT8188, MT8512, MT8516, MT8518, MT8519, MT8532, MT8676, MT8678, MT8695, MT8696, MT8698

0
Unknown
VulnerabilityCVE-2025-20765cvecve-2025-20765cwe-415
Published: Tue Dec 02 2025 (12/02/2025, 02:34:28 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6893, MT6895, MT6897, MT6899, MT6980D, MT6983, MT6985, MT6989, MT6990, MT6991, MT8113, MT8115, MT8139, MT8163, MT8168, MT8169, MT8183, MT8186, MT8188, MT8512, MT8516, MT8518, MT8519, MT8532, MT8676, MT8678, MT8695, MT8696, MT8698

Description

In aee daemon, there is a possible system crash due to a race condition. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10190802; Issue ID: MSV-4833.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:25:44 UTC

Technical Analysis

CVE-2025-20765 is a vulnerability classified as a double free (CWE-415) found in the aee daemon component of numerous MediaTek System on Chips (SoCs), including models MT2718 through MT8698. The flaw arises from a race condition that can cause the daemon to free the same memory twice, leading to memory corruption and ultimately a system crash. This vulnerability affects devices running Android versions 14.0 to 16.0, OpenWRT versions 21.02 and 23.05, and Yocto 4.0, which are commonly deployed in embedded systems, smartphones, and IoT devices. Exploitation does not require user interaction but does require the attacker to have already obtained System-level privileges, indicating a post-compromise scenario. The impact is primarily a local denial of service (DoS) due to system instability or crash. Although no exploits have been reported in the wild, the vulnerability poses a risk to device availability and reliability. The issue was reserved in November 2024 and published in December 2025, with a patch identified (ALPS10190802, Issue ID MSV-4833), though no direct patch links are provided. The vulnerability's root cause is a race condition leading to double freeing memory, a critical memory management error that can destabilize the system process responsible for error reporting and diagnostics (aee daemon).

Potential Impact

For European organizations, the primary impact of CVE-2025-20765 is the potential for local denial of service on devices using affected MediaTek chipsets. This can disrupt critical operations, especially in sectors relying on embedded systems such as telecommunications infrastructure, IoT deployments, and mobile devices. System crashes could lead to downtime, loss of monitoring and diagnostic capabilities, and increased maintenance costs. Since exploitation requires prior system-level access, the vulnerability is more likely to be leveraged in targeted attacks following an initial compromise, potentially as a method to disrupt forensic or recovery efforts. The broad range of affected chipsets means that many consumer and industrial devices could be impacted, increasing the attack surface. In environments with strict uptime requirements, such as healthcare or industrial control systems, this vulnerability could have significant operational consequences. Additionally, the lack of user interaction for exploitation increases the risk of automated or rapid exploitation once system privileges are obtained.

Mitigation Recommendations

1. Apply vendor-provided patches immediately once available to address the double free vulnerability in the aee daemon. 2. Restrict and monitor system-level privileges rigorously to prevent unauthorized escalation to System privilege, as exploitation requires such access. 3. Implement robust endpoint detection and response (EDR) solutions to detect abnormal daemon crashes or suspicious activity indicative of exploitation attempts. 4. Conduct regular audits of device firmware and software versions to ensure no vulnerable versions remain in use. 5. For embedded and IoT devices, employ network segmentation to isolate vulnerable devices and limit the impact of potential crashes. 6. Develop incident response plans that include recovery procedures for devices affected by daemon crashes to minimize downtime. 7. Collaborate with device vendors to obtain timely updates and verify patch deployment across all affected assets. 8. Use memory protection mechanisms and runtime integrity checks where possible to detect and prevent memory corruption issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b1f2f793a7de7f5f6f

Added to database: 12/2/2025, 3:06:25 AM

Last enriched: 12/2/2025, 3:25:44 AM

Last updated: 12/2/2025, 11:20:55 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats