Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20773: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

0
Medium
VulnerabilityCVE-2025-20773cvecve-2025-20773cwe-416
Published: Tue Dec 02 2025 (12/02/2025, 02:34:42 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4797.

AI-Powered Analysis

AILast updated: 01/12/2026, 20:59:45 UTC

Technical Analysis

CVE-2025-20773 is a use-after-free vulnerability categorized under CWE-416, affecting the display subsystem of numerous MediaTek chipsets including MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, and MT8793. These chipsets are integrated into Android devices running versions 14.0, 15.0, and 16.0. The vulnerability arises from improper memory management where freed memory is accessed, leading to memory corruption. This can be exploited locally by an attacker who already possesses system-level privileges to escalate their privileges further, potentially gaining higher control over the device. Notably, exploitation does not require any user interaction, increasing the risk in environments where system privileges might be compromised. The vulnerability impacts confidentiality, integrity, and availability of the affected devices, as indicated by the CVSS vector (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and a score of 6.7. MediaTek has acknowledged the issue and assigned patch ID ALPS10196993, though no public exploit code or widespread exploitation has been reported to date. The broad range of affected chipsets suggests a wide footprint across many consumer and industrial devices, especially smartphones and IoT products using MediaTek SoCs.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where devices with affected MediaTek chipsets are deployed. Since exploitation requires prior system-level access, the vulnerability mainly facilitates privilege escalation, enabling attackers to deepen their foothold and potentially bypass security controls. This can lead to unauthorized access to sensitive data, manipulation of device functions, or denial of service through memory corruption. Sectors relying heavily on mobile communications, embedded systems, or IoT devices—such as telecommunications, manufacturing, healthcare, and critical infrastructure—may be particularly vulnerable. The widespread use of MediaTek chipsets in mid-range and budget smartphones across Europe means that employees’ mobile devices could be a vector for lateral movement or targeted attacks. Additionally, embedded devices in industrial or consumer settings could be compromised, affecting operational continuity and data integrity. The absence of user interaction for exploitation increases the risk of stealthy attacks once system privileges are obtained.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should prioritize the following actions: 1) Deploy the official patches from MediaTek (patch ID ALPS10196993) as soon as they become available for affected devices and firmware. 2) Implement strict access controls to limit system-level privileges on devices, reducing the likelihood that an attacker can exploit this vulnerability. 3) Employ endpoint detection and response (EDR) solutions capable of monitoring for unusual local privilege escalation attempts or memory corruption indicators. 4) Conduct thorough inventory and asset management to identify devices using affected MediaTek chipsets and Android versions 14.0 to 16.0. 5) For IoT and embedded systems, ensure firmware updates are applied and consider network segmentation to isolate vulnerable devices. 6) Educate IT and security teams about this vulnerability to recognize potential exploitation signs and respond promptly. 7) Where possible, restrict installation of untrusted applications or code that could lead to initial system privilege compromise, thereby preventing the prerequisite condition for exploitation. 8) Collaborate with device vendors and service providers to confirm patch availability and deployment status.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f601a

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 1/12/2026, 8:59:45 PM

Last updated: 1/19/2026, 7:59:50 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats