Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20777: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20777cvecve-2025-20777cwe-787
Published: Tue Dec 02 2025 (12/02/2025, 02:34:49 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184870; Issue ID: MSV-4752.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:22:30 UTC

Technical Analysis

CVE-2025-20777 is a security vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a wide range of MediaTek System on Chips (SoCs), including but not limited to MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, and MT8883. The vulnerability exists in the display subsystem due to a missing bounds check, which allows an out-of-bounds write operation. This flaw can be exploited by a local attacker who already has System-level privileges on the device to escalate their privileges further, potentially gaining higher control over the device. Notably, exploitation does not require any user interaction, which increases the risk in environments where an attacker has already compromised system privileges. The affected devices run Android versions 14.0, 15.0, and 16.0. Although no public exploits have been reported yet, the vulnerability poses a significant risk given the widespread use of MediaTek chipsets in consumer and enterprise mobile devices. The vulnerability was published on December 2, 2025, with no CVSS score assigned yet. The patch identifier is ALPS10184870, and the issue ID is MSV-4752, indicating that a fix is available or forthcoming from MediaTek. The vulnerability could lead to unauthorized code execution or modification of critical system components, undermining device confidentiality, integrity, and availability.

Potential Impact

For European organizations, the impact of CVE-2025-20777 could be substantial, especially for those relying on mobile devices powered by MediaTek chipsets. The vulnerability allows privilege escalation from an already compromised System privilege level, potentially enabling attackers to gain full control over affected devices. This could lead to unauthorized access to sensitive corporate data, disruption of mobile device management, and compromise of secure communications. Sectors such as finance, healthcare, government, and critical infrastructure that depend on secure mobile endpoints are particularly at risk. The lack of user interaction requirement means that once an attacker has system-level access, they can exploit this vulnerability without alerting the user, increasing stealth and persistence. Given the broad range of affected chipsets and Android versions, a large number of devices in Europe could be vulnerable, potentially impacting both enterprise and consumer users. The vulnerability could also facilitate lateral movement within corporate networks if mobile devices are used as entry points. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains high.

Mitigation Recommendations

To mitigate CVE-2025-20777, European organizations should prioritize the following actions: 1) Apply the official MediaTek patch (ALPS10184870) as soon as it becomes available through device manufacturers or carriers to ensure the vulnerability is remediated at the chipset level. 2) Enforce strict privilege separation and limit the assignment of System-level privileges on devices to reduce the attack surface. 3) Implement robust mobile device management (MDM) solutions to monitor device integrity and detect anomalous privilege escalations or suspicious activity. 4) Conduct regular security audits and vulnerability assessments on mobile endpoints to identify devices running affected MediaTek chipsets and Android versions. 5) Educate users and administrators about the risks of privilege escalation vulnerabilities and encourage prompt installation of security updates. 6) Employ endpoint detection and response (EDR) tools capable of monitoring low-level system behavior on mobile devices. 7) Consider network segmentation and access controls to limit the impact of compromised devices within corporate environments. 8) Collaborate with device vendors and carriers to ensure timely updates and patches are distributed to end users. These measures go beyond generic advice by focusing on privilege management, monitoring, and patch deployment specific to the affected MediaTek platforms.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6026

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/2/2025, 3:22:30 AM

Last updated: 12/5/2025, 12:09:05 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats