CVE-2025-20776: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.
AI Analysis
Technical Summary
CVE-2025-20776 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the display subsystem of a broad range of MediaTek System on Chips (SoCs), including models MT6739 through MT8883. The vulnerability stems from a missing bounds check in the display code, which allows an attacker to read memory outside the intended buffer boundaries. This flaw can be exploited locally by an attacker who already possesses System-level privileges on the device, enabling them to escalate their privileges further. The vulnerability does not require any user interaction, increasing the risk of silent exploitation once initial access is obtained. It affects devices running Android versions 14.0, 15.0, and 16.0 that incorporate these MediaTek SoCs. The CVSS v3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability could allow attackers to read sensitive memory regions, corrupt data, or cause denial of service, potentially compromising device security and stability. The patch ID ALPS10184297 addresses this issue, but no direct patch links are provided. Given the extensive list of affected SoCs, this vulnerability impacts a wide range of devices globally, especially those relying on MediaTek chipsets for mobile and embedded applications.
Potential Impact
The vulnerability allows an attacker with existing System privileges to perform out-of-bounds reads, potentially leading to privilege escalation and unauthorized access to sensitive memory contents. This can compromise the confidentiality of sensitive data, integrity of system processes, and availability of the device by causing crashes or instability. Since exploitation requires local access with high privileges, the initial attack vector is limited, but the impact post-exploitation is significant. Devices running affected MediaTek SoCs on Android 14 to 16 are at risk, which includes a large number of smartphones and embedded devices worldwide. Organizations relying on these devices for critical operations could face data breaches, unauthorized control, or service disruptions. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. The widespread deployment of MediaTek chipsets in consumer and enterprise devices increases the potential scale of impact.
Mitigation Recommendations
1. Apply the official patch ALPS10184297 from MediaTek or device manufacturers as soon as it becomes available to remediate the vulnerability. 2. Restrict local access to devices running affected MediaTek SoCs by enforcing strict access controls and limiting System-level privileges only to trusted processes and users. 3. Monitor devices for unusual local activity or privilege escalations that could indicate exploitation attempts. 4. Employ runtime protections such as memory protection mechanisms and integrity checks to detect and prevent out-of-bounds memory accesses. 5. For organizations managing fleets of devices, implement automated patch management and vulnerability scanning focused on MediaTek chipset vulnerabilities. 6. Educate users and administrators about the risks of granting System privileges and the importance of applying security updates promptly. 7. Consider network segmentation and endpoint detection solutions to limit the spread and impact of potential compromises originating from exploited devices.
Affected Countries
China, India, United States, Indonesia, Brazil, Russia, Vietnam, Philippines, Thailand, Malaysia, Mexico, Egypt, South Africa
CVE-2025-20776: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
Description
In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184297; Issue ID: MSV-4759.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20776 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the display subsystem of a broad range of MediaTek System on Chips (SoCs), including models MT6739 through MT8883. The vulnerability stems from a missing bounds check in the display code, which allows an attacker to read memory outside the intended buffer boundaries. This flaw can be exploited locally by an attacker who already possesses System-level privileges on the device, enabling them to escalate their privileges further. The vulnerability does not require any user interaction, increasing the risk of silent exploitation once initial access is obtained. It affects devices running Android versions 14.0, 15.0, and 16.0 that incorporate these MediaTek SoCs. The CVSS v3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability could allow attackers to read sensitive memory regions, corrupt data, or cause denial of service, potentially compromising device security and stability. The patch ID ALPS10184297 addresses this issue, but no direct patch links are provided. Given the extensive list of affected SoCs, this vulnerability impacts a wide range of devices globally, especially those relying on MediaTek chipsets for mobile and embedded applications.
Potential Impact
The vulnerability allows an attacker with existing System privileges to perform out-of-bounds reads, potentially leading to privilege escalation and unauthorized access to sensitive memory contents. This can compromise the confidentiality of sensitive data, integrity of system processes, and availability of the device by causing crashes or instability. Since exploitation requires local access with high privileges, the initial attack vector is limited, but the impact post-exploitation is significant. Devices running affected MediaTek SoCs on Android 14 to 16 are at risk, which includes a large number of smartphones and embedded devices worldwide. Organizations relying on these devices for critical operations could face data breaches, unauthorized control, or service disruptions. The lack of required user interaction facilitates stealthy exploitation once initial access is gained. The widespread deployment of MediaTek chipsets in consumer and enterprise devices increases the potential scale of impact.
Mitigation Recommendations
1. Apply the official patch ALPS10184297 from MediaTek or device manufacturers as soon as it becomes available to remediate the vulnerability. 2. Restrict local access to devices running affected MediaTek SoCs by enforcing strict access controls and limiting System-level privileges only to trusted processes and users. 3. Monitor devices for unusual local activity or privilege escalations that could indicate exploitation attempts. 4. Employ runtime protections such as memory protection mechanisms and integrity checks to detect and prevent out-of-bounds memory accesses. 5. For organizations managing fleets of devices, implement automated patch management and vulnerability scanning focused on MediaTek chipset vulnerabilities. 6. Educate users and administrators about the risks of granting System privileges and the importance of applying security updates promptly. 7. Consider network segmentation and endpoint detection solutions to limit the spread and impact of potential compromises originating from exploited devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.400Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f6023
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 2/27/2026, 4:54:07 AM
Last updated: 3/25/2026, 1:22:37 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.