Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20776: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20776cvecve-2025-20776cwe-125
Published: Tue Dec 02 2025 (12/02/2025, 02:34:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:22:47 UTC

Technical Analysis

CVE-2025-20776 is a security vulnerability classified as an out-of-bounds read (CWE-125) found in the display component of a wide range of MediaTek System on Chips (SoCs), including models MT6739 through MT8883. These SoCs are integrated into many Android devices running versions 14.0, 15.0, and 16.0. The vulnerability arises from a missing bounds check in the display driver code, which can cause the system to read memory outside the intended buffer limits. This flaw can be exploited by an attacker who already has System-level privileges on the device to escalate their privileges further, potentially gaining more control over the device's operating environment. Notably, exploitation does not require any user interaction, which increases the risk profile in environments where attackers have already compromised lower privilege levels. Although no public exploits have been reported yet, the vulnerability's presence in widely deployed chipsets makes it a significant concern. The issue was reserved in November 2024 and published in December 2025, with MediaTek acknowledging the problem and issuing a patch (ALPS10184297). The vulnerability impacts confidentiality and integrity by enabling unauthorized privilege escalation, which could lead to further compromise of sensitive data or system stability. The broad range of affected chipsets indicates a large attack surface, especially in mobile devices prevalent in consumer and enterprise environments. The lack of a CVSS score necessitates an assessment based on the vulnerability's characteristics, including its local exploitation requirement, absence of user interaction, and potential for privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2025-20776 can be significant, particularly for those relying on Android devices powered by the affected MediaTek chipsets. The vulnerability allows local privilege escalation from System-level access, which could be leveraged by attackers who have already compromised a device to gain deeper control, potentially accessing sensitive corporate data or bypassing security controls. This is especially critical for sectors such as finance, healthcare, and government, where mobile device security is paramount. The absence of required user interaction means that once initial access is obtained, attackers can escalate privileges stealthily, increasing the risk of persistent threats and data breaches. Additionally, organizations with bring-your-own-device (BYOD) policies or mobile workforce deployments may face increased exposure if devices are not patched promptly. The vulnerability could also affect mobile device management (MDM) solutions that rely on these chipsets, potentially undermining endpoint security strategies. Overall, the threat could compromise confidentiality, integrity, and availability of mobile endpoints, impacting business operations and regulatory compliance within the European Union and broader region.

Mitigation Recommendations

To mitigate CVE-2025-20776, European organizations should prioritize the following actions: 1) Deploy the official MediaTek patch (ALPS10184297) as soon as it becomes available for affected devices to eliminate the out-of-bounds read vulnerability. 2) Implement strict access controls to limit System-level privileges only to trusted processes and users, reducing the risk of privilege escalation exploitation. 3) Conduct thorough inventory and asset management to identify devices using the affected MediaTek chipsets and Android versions 14.0 to 16.0. 4) Enforce mobile device security policies that include regular patching, use of endpoint protection, and monitoring for unusual privilege escalations or anomalous behavior. 5) For organizations with BYOD policies, require compliance checks and patch verification before granting network access. 6) Employ runtime application self-protection (RASP) or similar technologies on critical mobile applications to detect and prevent exploitation attempts. 7) Educate security teams on the specifics of this vulnerability to enhance incident detection and response capabilities. 8) Collaborate with device manufacturers and mobile carriers to ensure timely updates and awareness. These measures go beyond generic advice by focusing on privilege management, patch prioritization, and device-specific controls tailored to the MediaTek chipset ecosystem.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6023

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/2/2025, 3:22:47 AM

Last updated: 12/5/2025, 12:08:47 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats