Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20776: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20776cvecve-2025-20776cwe-125
Published: Tue Dec 02 2025 (12/02/2025, 02:34:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:54:07 UTC

Technical Analysis

CVE-2025-20776 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the display subsystem of a broad range of MediaTek System on Chips (SoCs), including models MT6739 through MT8883. The vulnerability stems from a missing bounds check in the display code, which allows an attacker to read memory outside the intended buffer boundaries. This flaw can be exploited locally by an attacker who already possesses System-level privileges on the device, enabling them to escalate their privileges further. The vulnerability does not require any user interaction, increasing the risk of silent exploitation once initial access is obtained. It affects devices running Android versions 14.0, 15.0, and 16.0 that incorporate these MediaTek SoCs. The CVSS v3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability could allow attackers to read sensitive memory regions, corrupt data, or cause denial of service, potentially compromising device security and stability. The patch ID ALPS10184297 addresses this issue, but no direct patch links are provided. Given the extensive list of affected SoCs, this vulnerability impacts a wide range of devices globally, especially those relying on MediaTek chipsets for mobile and embedded applications.

Potential Impact

The vulnerability allows an attacker with existing System privileges to perform out-of-bounds reads, potentially leading to privilege escalation and unauthorized access to sensitive memory contents. This can compromise the confidentiality of sensitive data, integrity of system processes, and availability of the device by causing crashes or instability. Since exploitation requires local access with high privileges, the initial attack vector is limited, but the impact post-exploitation is significant. Devices running affected MediaTek SoCs on Android 14 to 16 are at risk, which includes a large number of smartphones and embedded devices worldwide. Organizations relying on these devices for critical operations could face data breaches, unauthorized control, or service disruptions. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. The widespread deployment of MediaTek chipsets in consumer and enterprise devices increases the potential scale of impact.

Mitigation Recommendations

1. Apply the official patch ALPS10184297 from MediaTek or device manufacturers as soon as it becomes available to remediate the vulnerability. 2. Restrict local access to devices running affected MediaTek SoCs by enforcing strict access controls and limiting System-level privileges only to trusted processes and users. 3. Monitor devices for unusual local activity or privilege escalations that could indicate exploitation attempts. 4. Employ runtime protections such as memory protection mechanisms and integrity checks to detect and prevent out-of-bounds memory accesses. 5. For organizations managing fleets of devices, implement automated patch management and vulnerability scanning focused on MediaTek chipset vulnerabilities. 6. Educate users and administrators about the risks of granting System privileges and the importance of applying security updates promptly. 7. Consider network segmentation and endpoint detection solutions to limit the spread and impact of potential compromises originating from exploited devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6023

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 2/27/2026, 4:54:07 AM

Last updated: 3/26/2026, 10:21:16 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses