Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20770: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

0
Medium
VulnerabilityCVE-2025-20770cvecve-2025-20770cwe-416
Published: Tue Dec 02 2025 (12/02/2025, 02:34:37 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4803.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:28:09 UTC

Technical Analysis

CVE-2025-20770 is a use-after-free vulnerability classified under CWE-416 that affects a broad range of MediaTek chipsets including MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, and MT8793. These chipsets are embedded in devices running Android versions 14.0, 15.0, and 16.0. The vulnerability arises from improper handling of memory in the display subsystem, where a freed memory region is accessed again, leading to memory corruption. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining unauthorized control over sensitive system components. Exploitation does not require user interaction, increasing the risk once initial access is obtained. The CVSS v3.1 score is 6.7 (medium severity) with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but a patch identified as ALPS10196993 (Issue ID MSV-4803) is available from MediaTek. The vulnerability's presence in widely deployed chipsets means it could affect a large number of Android devices globally, especially those in Europe using MediaTek SoCs. The flaw's exploitation could lead to significant security breaches, including unauthorized data access, system manipulation, and denial of service.

Potential Impact

For European organizations, the impact of CVE-2025-20770 is significant primarily in environments where devices with affected MediaTek chipsets are used, such as corporate mobile devices, IoT endpoints, or embedded systems. Since exploitation requires System-level privileges, the vulnerability mainly escalates the threat posed by attackers who have already compromised a device. Successful exploitation could lead to full system compromise, data leakage, or disruption of critical services relying on these devices. This is particularly concerning for sectors like finance, healthcare, government, and telecommunications, where mobile device security is paramount. The lack of user interaction required for exploitation increases the risk of automated or stealthy attacks once initial access is gained. Additionally, the widespread use of MediaTek chipsets in mid-range and budget devices means a large attack surface exists, potentially affecting a broad user base within European enterprises and consumers. The vulnerability could also undermine trust in mobile security and complicate compliance with data protection regulations such as GDPR if exploited to access personal or sensitive data.

Mitigation Recommendations

To mitigate CVE-2025-20770 effectively, European organizations should: 1) Prioritize deployment of the official MediaTek patch ALPS10196993 as soon as it becomes available and verify patch application on all affected devices. 2) Implement strict access controls to limit System-level privileges only to trusted processes and users, reducing the risk of privilege escalation. 3) Employ mobile device management (MDM) solutions to monitor device integrity and detect anomalous behavior indicative of exploitation attempts. 4) Conduct regular security audits and vulnerability assessments on devices using MediaTek chipsets to identify unpatched systems. 5) Educate users and administrators about the risks of privilege escalation vulnerabilities and enforce the principle of least privilege. 6) Where possible, isolate critical applications and data from devices with affected chipsets or consider alternative hardware platforms for high-security environments. 7) Monitor threat intelligence feeds for any emerging exploits or indicators of compromise related to this vulnerability to enable rapid response. 8) Collaborate with device vendors and service providers to ensure timely updates and security support.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.399Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b1f2f793a7de7f5f7e

Added to database: 12/2/2025, 3:06:25 AM

Last enriched: 12/9/2025, 4:28:09 AM

Last updated: 1/18/2026, 4:04:00 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats