Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20778: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2025-20778cvecve-2025-20778cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:52 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184870; Issue ID: MSV-4729.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:37:59 UTC

Technical Analysis

CVE-2025-20778 is a security vulnerability classified under CWE-787 (Out-of-bounds Write) found in the display component of a wide range of MediaTek System on Chips (SoCs), including MT6739 through MT8883 series. The vulnerability stems from a missing bounds check in the display driver code, which allows an attacker with System-level privileges to perform an out-of-bounds write operation. This flaw can lead to local privilege escalation, enabling the attacker to gain higher-level control over the device. The vulnerability affects devices running Android versions 14.0, 15.0, and 16.0 that incorporate these MediaTek chipsets. Exploitation does not require user interaction, but it does require the attacker to have already obtained System privileges, limiting the attack vector to local threat actors or malware that has escalated to that level. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if leveraged, potentially compromising device security by corrupting memory or executing arbitrary code at a higher privilege level. The patch identified as ALPS10184870 addresses this issue, though no direct patch links are provided. The vulnerability’s broad impact is due to the extensive list of affected MediaTek SoCs commonly used in mid-range to high-end smartphones and IoT devices. The lack of a CVSS score necessitates an expert severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, the impact of CVE-2025-20778 could be substantial, particularly for enterprises relying on mobile devices or IoT hardware powered by affected MediaTek chipsets. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to unauthorized access to sensitive data, installation of persistent malware, or disruption of device functionality. This could compromise confidentiality, integrity, and availability of corporate mobile endpoints or embedded systems. Given the widespread use of MediaTek SoCs in consumer and industrial devices, sectors such as telecommunications, manufacturing, and critical infrastructure could be indirectly affected through compromised devices. The lack of user interaction requirement increases risk in environments where devices are shared or exposed to local threat actors. However, the prerequisite of existing System privileges limits remote exploitation, reducing the likelihood of widespread remote attacks but emphasizing the need for strong internal security controls. The absence of known exploits currently provides a window for proactive mitigation before active exploitation emerges.

Mitigation Recommendations

1. Apply vendor-supplied patches promptly once available to address the out-of-bounds write vulnerability. 2. Restrict and monitor System-level access on devices using affected MediaTek chipsets to prevent unauthorized privilege escalation. 3. Implement robust endpoint security solutions capable of detecting anomalous local activity indicative of privilege escalation attempts. 4. Enforce strict application sandboxing and privilege separation to limit the ability of compromised applications to gain System privileges. 5. Conduct regular security audits and vulnerability assessments on mobile and IoT devices within the organization to identify and remediate potential weaknesses. 6. Educate users and administrators about the risks of granting elevated privileges and the importance of applying security updates. 7. For organizations deploying custom Android builds, ensure integration of the latest security patches from MediaTek and Android security bulletins. 8. Monitor threat intelligence feeds for emerging exploit reports related to this CVE to adjust defensive measures accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.400Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd398

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/6/2026, 2:37:59 AM

Last updated: 1/8/2026, 10:18:27 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats