Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20778: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2025-20778cvecve-2025-20778cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:52 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2025-20778 is a high-severity out-of-bounds write vulnerability in MediaTek display drivers affecting numerous MediaTek SoCs running Android versions 14. 0 to 16. 0. The flaw arises from a missing bounds check, allowing a local attacker with System privileges to escalate privileges further without requiring user interaction. Exploitation could lead to full compromise of confidentiality, integrity, and availability of the affected device. Although no public exploits are known yet, the vulnerability’s high CVSS score (7. 8) and broad device impact make it a significant risk. European organizations using devices with these MediaTek chipsets, especially in mobile or embedded contexts, should prioritize patching once updates are available. Countries with high smartphone penetration and significant use of MediaTek-based devices, such as Germany, France, Italy, Spain, and the UK, are most likely to be affected. Mitigation involves applying vendor patches promptly, restricting System-level access, and monitoring for suspicious local activity.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:50:10 UTC

Technical Analysis

CVE-2025-20778 is an out-of-bounds write vulnerability classified under CWE-787, discovered in the display driver components of a wide range of MediaTek System-on-Chips (SoCs), including but not limited to MT6739, MT6761, MT6765, MT6768, and many others. These SoCs are commonly integrated into smartphones and embedded devices running Android versions 14.0 through 16.0. The root cause is a missing bounds check in the display driver code, which allows an attacker who already has System-level privileges on the device to perform an out-of-bounds write operation. This memory corruption can lead to escalation of privileges, potentially granting the attacker higher control over the device’s kernel or critical system components. Notably, exploitation does not require user interaction, increasing the risk of automated or stealthy attacks. The vulnerability has a CVSS v3.1 base score of 7.8, indicating high severity, with attack vector classified as local, low attack complexity, requiring privileges, and no user interaction. The impact covers confidentiality, integrity, and availability, meaning an attacker could exfiltrate sensitive data, modify system behavior, or cause denial of service. Although no known exploits are currently in the wild, the vulnerability’s presence in widely deployed MediaTek chipsets makes it a significant concern. The patch identifier ALPS10184870 has been issued by MediaTek, but no direct patch links are provided in the source data. The vulnerability was publicly disclosed in early 2026, with the initial reservation date in late 2024, indicating a responsible disclosure timeline. Given the broad range of affected chipsets, the vulnerability affects a large segment of devices globally, especially those using mid-range to high-end MediaTek SoCs.

Potential Impact

For European organizations, the impact of CVE-2025-20778 is considerable, especially for enterprises relying on mobile devices or embedded systems powered by MediaTek chipsets. The vulnerability enables local privilege escalation, which could be leveraged by malicious insiders or malware that has already gained limited access to the device. This could lead to unauthorized access to sensitive corporate data, disruption of mobile device management, or compromise of secure communication channels. Industries such as finance, healthcare, and critical infrastructure that depend on mobile security could face increased risk of data breaches or operational disruption. Additionally, the vulnerability could be exploited to bypass security controls on devices used for remote work, increasing the attack surface. The lack of user interaction requirement means automated malware or worms could potentially exploit this flaw once local access is obtained. The broad range of affected MediaTek SoCs means many consumer and enterprise devices in Europe are potentially vulnerable, increasing the likelihood of targeted attacks. The high CVSS score reflects the serious nature of the threat, emphasizing the need for rapid mitigation to prevent exploitation.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available; monitor vendor advisories closely. 2. Restrict System-level access on devices by enforcing strict access controls and minimizing the number of apps or processes granted such privileges. 3. Employ mobile device management (MDM) solutions to enforce security policies, including timely patch deployment and privilege restrictions. 4. Monitor devices for unusual local activity or privilege escalation attempts using endpoint detection and response (EDR) tools tailored for mobile platforms. 5. Educate users and administrators about the risks of granting elevated privileges to untrusted applications or processes. 6. For organizations developing custom Android builds or embedded systems with MediaTek SoCs, conduct thorough code audits and implement additional bounds checking in display driver code. 7. Consider network segmentation and limiting physical access to devices to reduce the risk of local exploitation. 8. Maintain up-to-date inventories of devices using affected MediaTek chipsets to prioritize patching and risk assessment. 9. Collaborate with device vendors to ensure timely security updates and transparency regarding vulnerability status.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd398

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/14/2026, 1:50:10 AM

Last updated: 2/6/2026, 5:41:28 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats