Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20768: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991

0
High
VulnerabilityCVE-2025-20768cvecve-2025-20768cwe-125
Published: Tue Dec 02 2025 (12/02/2025, 02:34:33 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991

Description

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4805.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:27:26 UTC

Technical Analysis

CVE-2025-20768 is a vulnerability classified under CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek System on Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, and MT6991. These SoCs are embedded in numerous Android devices running versions 14.0 through 16.0. The vulnerability arises from a missing bounds check in the display subsystem, which leads to an out-of-bounds read condition. This flaw can be exploited by a local attacker who has already obtained System privileges on the device, enabling them to escalate privileges further. The attack does not require any user interaction, increasing the risk of silent exploitation. The CVSS v3.1 base score is 7.8, indicating high severity, with vector metrics AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access with low complexity, privileges at the System level, no user interaction, unchanged scope, and results in high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the potential for privilege escalation and system compromise. The patch has been identified by MediaTek under Patch ID ALPS10196993 but is not linked in the provided data. The vulnerability was reserved in November 2024 and published in December 2025. This issue is critical for devices using these MediaTek chipsets, especially in environments where Android devices are used for sensitive operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where Android devices powered by the affected MediaTek SoCs are used, including corporate mobile devices, IoT endpoints, and embedded systems. Successful exploitation could lead to local privilege escalation from System level to potentially higher privileges, enabling attackers to bypass security controls, access sensitive data, manipulate device functions, or disrupt availability. This could result in data breaches, loss of intellectual property, unauthorized surveillance, or denial of service. The lack of required user interaction facilitates stealthy exploitation, increasing the risk of unnoticed compromise. Sectors such as finance, healthcare, government, and critical infrastructure in Europe that rely on mobile devices for secure communications and operations are particularly vulnerable. Additionally, the widespread use of MediaTek chipsets in mid-range and budget devices means a large attack surface exists, including devices used by employees remotely or in hybrid work scenarios. The impact extends to supply chain security, as compromised devices could be used as footholds for broader network intrusion.

Mitigation Recommendations

1. Immediate application of vendor-provided patches (Patch ID ALPS10196993) once available is critical to remediate the vulnerability. 2. Implement strict access controls to limit System-level privileges on Android devices, ensuring only trusted applications and processes have such access. 3. Employ mobile device management (MDM) solutions to enforce security policies, monitor for privilege escalation attempts, and control app installations. 4. Conduct regular security audits and integrity checks on devices to detect anomalous behavior indicative of exploitation. 5. Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of timely updates. 6. For organizations deploying custom Android builds, incorporate additional bounds checking and secure coding practices in display and related subsystems. 7. Isolate critical mobile devices from sensitive networks where possible to limit lateral movement in case of compromise. 8. Monitor threat intelligence feeds for emerging exploits targeting this CVE to enable rapid response. 9. Collaborate with device vendors and carriers to ensure timely distribution and installation of security updates across all affected devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.399Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b1f2f793a7de7f5f78

Added to database: 12/2/2025, 3:06:25 AM

Last enriched: 12/9/2025, 4:27:26 AM

Last updated: 1/17/2026, 5:35:22 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats