Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20773: CWE-415 Double Free in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

0
Medium
VulnerabilityCVE-2025-20773cvecve-2025-20773cwe-415
Published: Tue Dec 02 2025 (12/02/2025, 02:34:42 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, MT8793

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10196993; Issue ID: MSV-4797.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:23:31 UTC

Technical Analysis

CVE-2025-20773 is a security vulnerability classified as a double free (CWE-415) in the display subsystem of numerous MediaTek System on Chips (SoCs), including MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8792, and MT8793. These chipsets are integrated into a wide range of Android devices running versions 14.0 through 16.0. The vulnerability arises from improper memory management in the display driver, specifically a use-after-free condition that can lead to memory corruption. An attacker who has already obtained system-level privileges can exploit this flaw to escalate privileges further, potentially gaining higher control over the device. Notably, exploitation does not require any user interaction, which increases the risk in environments where system privileges are already compromised. While no public exploits have been reported, the vulnerability’s presence in widely deployed chipsets makes it a significant concern. The vendor has acknowledged the issue with a patch identified as ALPS10196993, although no direct patch links are provided. The vulnerability’s technical details indicate that it affects the confidentiality, integrity, and availability of affected devices by enabling privilege escalation, which could be leveraged for persistent control or further attacks.

Potential Impact

For European organizations, the impact of CVE-2025-20773 is considerable due to the widespread use of MediaTek-based Android devices in both consumer and enterprise environments. Privilege escalation vulnerabilities can enable attackers to bypass security controls, install persistent malware, or exfiltrate sensitive data. In sectors such as finance, healthcare, and critical infrastructure, compromised devices could serve as entry points for broader network intrusions. The lack of required user interaction means that once system privileges are obtained, attackers can exploit this vulnerability silently, increasing the risk of undetected compromise. Additionally, IoT devices and embedded systems using these chipsets in industrial or smart city applications across Europe could be similarly affected, potentially disrupting services or causing data breaches. The broad range of affected chipsets and Android versions increases the scope of impact, necessitating urgent attention from security teams managing mobile device fleets and embedded systems.

Mitigation Recommendations

1. Immediate deployment of vendor patches once available is critical; organizations should monitor MediaTek and device manufacturers for updates related to ALPS10196993. 2. Implement strict access controls to limit the ability of users or applications to gain system-level privileges, reducing the risk of initial compromise. 3. Employ mobile device management (MDM) solutions to enforce security policies, monitor device integrity, and ensure timely patching. 4. Conduct regular security audits and vulnerability assessments on devices using affected MediaTek chipsets, especially those in sensitive environments. 5. Utilize runtime protection and behavior monitoring tools to detect anomalous activities indicative of privilege escalation attempts. 6. Educate users and administrators about the risks of privilege escalation and the importance of applying updates promptly. 7. For IoT deployments, segment networks to isolate vulnerable devices and limit potential lateral movement by attackers. 8. Maintain an incident response plan tailored to mobile and embedded device compromises to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f601a

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/2/2025, 3:23:31 AM

Last updated: 12/5/2025, 12:07:57 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats