Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20777: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20777cvecve-2025-20777cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 02:34:49 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184870; Issue ID: MSV-4752.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:30:01 UTC

Technical Analysis

CVE-2025-20777 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek chipsets (including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883) embedded in Android devices running versions 14.0 through 16.0. The vulnerability stems from a missing bounds check in the display subsystem, which can cause an out-of-bounds write condition. This flaw allows a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher control over the device. The attack vector requires local access with high privileges but does not require user interaction, increasing the risk of automated or stealthy exploitation once initial access is obtained. The vulnerability affects confidentiality, integrity, and availability of the device, as it could allow arbitrary code execution or system compromise. The CVSS v3.1 score is 6.7, indicating medium severity, with attack vector local (AV:L), attack complexity low (AC:L), privileges required high (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known at this time, but the broad range of affected chipsets and Android versions makes this a significant risk for device manufacturers and users. The patch identifier ALPS10184870 addresses this issue, and vendors are expected to release updates accordingly.

Potential Impact

For European organizations, the impact of CVE-2025-20777 can be substantial, especially for those relying on mobile devices or embedded systems powered by affected MediaTek chipsets. The vulnerability allows privilege escalation from an already high-privilege context, which could enable attackers to bypass security controls, access sensitive data, or disrupt device functionality. This can lead to data breaches, loss of device integrity, and potential denial of service. Organizations using these devices for critical communications, authentication, or operational technology could face operational disruptions and compliance risks under GDPR and other regulations. The lack of required user interaction means that once an attacker gains system-level access, exploitation can be automated or performed stealthily, increasing the threat level. Although no exploits are currently known in the wild, the widespread deployment of these chipsets in consumer and enterprise devices across Europe increases the attack surface. The vulnerability also poses risks to supply chain security, as compromised devices could be used as footholds for broader network intrusions.

Mitigation Recommendations

To mitigate CVE-2025-20777, European organizations should prioritize the following actions: 1) Ensure all affected devices are updated with the latest security patches provided by device manufacturers or MediaTek, specifically the patch identified as ALPS10184870. 2) Implement strict access controls and monitoring to prevent unauthorized local access to devices, as exploitation requires system-level privileges. 3) Employ endpoint detection and response (EDR) solutions capable of detecting anomalous privilege escalation attempts on mobile and embedded devices. 4) Enforce the principle of least privilege on devices to minimize the number of processes or users with system-level access. 5) Conduct regular security audits and penetration testing focusing on mobile device security posture. 6) Collaborate with device vendors to ensure timely patch deployment and verify patch integrity. 7) Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of applying updates promptly. 8) For critical environments, consider network segmentation and device isolation to limit the impact of a compromised device. These steps go beyond generic advice by focusing on controlling local access, monitoring for privilege escalation, and ensuring patch management rigor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6026

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/9/2025, 4:30:01 AM

Last updated: 1/18/2026, 9:32:05 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats