Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20767: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

0
High
VulnerabilityCVE-2025-20767cvecve-2025-20767cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 02:34:32 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

Description

In display, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4807.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:25:10 UTC

Technical Analysis

CVE-2025-20767 is a security vulnerability classified as an out-of-bounds write (CWE-787) found in the display subsystem of numerous MediaTek chipsets, including MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, and MT8793. These chipsets are widely used in Android devices running versions 14.0 through 16.0. The vulnerability stems from an integer overflow in the display driver code that leads to writing data outside the intended memory bounds. This memory corruption can be exploited by a local attacker who already has System-level privileges on the device to escalate their privileges further, potentially gaining kernel-level or other elevated access. The flaw does not require any user interaction to exploit, which increases the risk in environments where an attacker has already compromised system-level access. No public exploits or active attacks have been reported to date. The vulnerability was reserved in November 2024 and published in December 2025, with MediaTek assigning the issue ID MSV-4807 and patch ID ALPS10196993. Although no CVSS score has been assigned, the nature of the vulnerability—out-of-bounds write leading to privilege escalation—indicates a serious security risk. The affected devices span a broad range of MediaTek SoCs used in smartphones, tablets, and potentially IoT devices, making the attack surface significant. The vulnerability could compromise device confidentiality, integrity, and availability if exploited successfully.

Potential Impact

For European organizations, the impact of CVE-2025-20767 could be substantial, especially those relying on Android devices powered by affected MediaTek chipsets. Successful exploitation could allow attackers who have already gained system-level access to escalate privileges further, potentially leading to full device compromise. This could result in unauthorized access to sensitive corporate data, disruption of mobile device management, and undermining of endpoint security controls. In sectors such as finance, healthcare, and government, where mobile devices are integral to operations and data protection is critical, this vulnerability could facilitate lateral movement or persistent access by threat actors. Additionally, IoT devices using these chipsets could be similarly affected, posing risks to industrial control systems or smart infrastructure. The lack of required user interaction means that once system access is obtained, exploitation can be automated or triggered without user awareness, increasing the risk of stealthy attacks. The broad range of affected chipsets and Android versions implies a wide scope of vulnerable devices across Europe, potentially impacting both consumer and enterprise environments.

Mitigation Recommendations

To mitigate CVE-2025-20767, European organizations should prioritize the following actions: 1) Monitor MediaTek and device vendor advisories closely and apply patches or firmware updates as soon as they become available to remediate the integer overflow and out-of-bounds write. 2) Restrict and monitor system-level privileges on Android devices to minimize the risk of attackers gaining initial system access, including enforcing strong authentication and device management policies. 3) Employ mobile threat defense solutions capable of detecting anomalous behavior indicative of privilege escalation attempts. 4) Conduct regular security audits and vulnerability assessments on mobile fleets to identify devices running affected chipsets and Android versions. 5) Implement network segmentation and least privilege principles to limit the impact of compromised devices within corporate networks. 6) Educate users and administrators about the risks of rooting or installing untrusted applications that could facilitate system-level compromise. 7) For IoT deployments using MediaTek chipsets, ensure firmware integrity verification and secure update mechanisms are in place to rapidly address vulnerabilities. These targeted measures go beyond generic advice by focusing on controlling system privileges, patch management, and device-specific risk reduction.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.399Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b1f2f793a7de7f5f75

Added to database: 12/2/2025, 3:06:25 AM

Last enriched: 12/2/2025, 3:25:10 AM

Last updated: 12/5/2025, 12:03:16 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats