Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20779: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2025-20779cvecve-2025-20779cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:46:54 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2025-20779 is a high-severity use-after-free vulnerability in multiple MediaTek SoCs affecting Android versions 14. 0 to 16. 0. The flaw arises from a race condition in the display component, enabling local privilege escalation if the attacker already has system-level privileges. Exploitation does not require user interaction but does require prior system privilege, limiting initial attack vectors. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 0. No known exploits are currently reported in the wild. European organizations using devices with affected MediaTek chipsets, especially in mobile or embedded systems, should prioritize patching once available. Mitigation involves applying vendor patches, restricting system-level access, and monitoring for suspicious local activity.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:50:28 UTC

Technical Analysis

CVE-2025-20779 is a use-after-free vulnerability categorized under CWE-416, discovered in the display subsystem of numerous MediaTek system-on-chips (SoCs), including models MT6739 through MT8883. The vulnerability stems from a race condition that leads to improper memory management, specifically freeing memory that is still in use. This flaw can be exploited locally by an attacker who has already obtained System-level privileges on an affected device, allowing them to escalate privileges further, potentially gaining higher control over the device. The affected devices run Android versions 14.0, 15.0, and 16.0, which are recent and likely deployed in modern smartphones and embedded systems. The vulnerability does not require user interaction, increasing the risk of automated or stealthy exploitation once system access is gained. The CVSS v3.1 base score is 7.0, reflecting high impact on confidentiality, integrity, and availability, but with a higher attack complexity (AC:H) and requiring low privileges (PR:L). The vulnerability does not have known exploits in the wild yet, but the presence of a patch (ALPS10184084) indicates vendor awareness and remediation efforts. The issue is significant because use-after-free bugs can lead to arbitrary code execution, system crashes, or data corruption, which in a display driver context could compromise the device's security posture. The broad range of affected MediaTek chipsets suggests a widespread impact across many device models globally. The vulnerability's exploitation scope is local, limiting remote attack vectors but emphasizing the importance of securing system-level access and applying patches promptly.

Potential Impact

For European organizations, the impact of CVE-2025-20779 is primarily on devices utilizing affected MediaTek chipsets running Android 14 to 16. This includes smartphones, tablets, and potentially embedded systems in IoT or industrial contexts. Successful exploitation can lead to local privilege escalation, allowing attackers with system privileges to gain higher control, potentially compromising sensitive data, undermining device integrity, or causing denial of service. This can affect corporate mobile device management, secure communications, and any business processes relying on mobile endpoints. The confidentiality of corporate data stored or accessed on affected devices could be at risk, as well as the integrity of applications and system components. Availability may also be impacted if the vulnerability is exploited to crash or destabilize devices. Given the high penetration of Android devices in Europe and the popularity of MediaTek chipsets in mid-range and budget devices, many users and organizations could be exposed. The lack of required user interaction facilitates stealthy exploitation post-compromise, increasing the risk of persistent threats. However, the prerequisite of existing system privileges limits initial exploitation to scenarios where attackers have already bypassed other security controls, such as through malware or insider threats.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the use-after-free vulnerability. 2. Restrict system-level privileges on devices by enforcing strict access controls and minimizing the number of apps or processes with elevated rights. 3. Employ mobile device management (MDM) solutions to monitor and control device configurations, ensuring timely updates and detecting anomalous behavior indicative of privilege escalation attempts. 4. Harden endpoint security by using application whitelisting, sandboxing, and runtime protection to reduce the risk of initial system privilege compromise. 5. Educate users and administrators about the risks of installing untrusted applications or rooting devices, which can increase exposure to local privilege escalation vulnerabilities. 6. Implement network segmentation and zero-trust principles to limit lateral movement if a device is compromised. 7. Monitor logs and system behavior for signs of exploitation attempts, such as unexpected crashes or privilege escalations. 8. For organizations deploying embedded or IoT devices with affected chipsets, ensure firmware updates are part of the security lifecycle and consider device replacement if patches are unavailable.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd39b

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/14/2026, 1:50:28 AM

Last updated: 2/5/2026, 5:38:42 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats