Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20780: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2025-20780cvecve-2025-20780cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:46:55 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2025-20780 is a high-severity use-after-free vulnerability affecting numerous MediaTek chipsets used in Android 15. 0 and 16. 0 devices. The flaw exists in the display component, leading to potential memory corruption. Exploitation requires local access with system privileges but no user interaction, enabling escalation of privileges. The vulnerability impacts confidentiality, integrity, and availability, with a CVSS score of 7. 8. No known exploits are currently reported in the wild. European organizations using devices with these MediaTek chipsets could face risks if attackers gain initial system-level access. Mitigation requires prompt application of vendor patches once available and enhanced monitoring of devices with affected chipsets.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:50:47 UTC

Technical Analysis

CVE-2025-20780 is a use-after-free vulnerability (CWE-416) identified in the display subsystem of a broad range of MediaTek chipsets, including MT6739 through MT8883 series, which are widely deployed in Android devices running versions 15.0 and 16.0. The vulnerability arises from improper memory management where a freed memory region is accessed again, leading to memory corruption. This flaw can be exploited locally by an attacker who already possesses system-level privileges on the device, allowing them to escalate their privileges further, potentially gaining higher control over the system. The exploit does not require user interaction, increasing the risk of automated or stealthy attacks once initial access is obtained. The vulnerability affects confidentiality, integrity, and availability of the device, as it can lead to arbitrary code execution or system crashes. The CVSS v3.1 score of 7.8 reflects a high severity, with attack vector local, low attack complexity, requiring privileges but no user interaction, and impacting all three security properties critically. Although no known exploits have been reported in the wild, the wide range of affected chipsets and Android versions suggests a significant attack surface. The issue has been assigned a patch ID ALPS10184061 by MediaTek, but no public patch links are currently available. Organizations should monitor for patch releases and prepare to deploy updates promptly to mitigate risks.

Potential Impact

For European organizations, the impact of CVE-2025-20780 can be substantial, especially for those relying on mobile devices or embedded systems powered by affected MediaTek chipsets. The vulnerability allows local attackers with system privileges to escalate their access, potentially compromising sensitive data, disrupting device operations, or deploying persistent malware. This can affect corporate mobile devices, IoT endpoints, and critical communication tools, leading to data breaches, operational downtime, and reputational damage. Given the widespread use of MediaTek chipsets in mid-range and budget smartphones popular in Europe, the vulnerability broadens the risk landscape. Additionally, sectors such as finance, healthcare, and government, which often use mobile devices for secure communications, may face heightened risks. The lack of user interaction requirement means that once initial access is gained, exploitation can be automated, increasing the threat's severity. The absence of known exploits currently provides a window for proactive mitigation, but also implies that attackers may develop exploits in the future.

Mitigation Recommendations

1. Monitor MediaTek and device vendor advisories closely for the release of official patches corresponding to patch ID ALPS10184061 and apply them immediately upon availability. 2. Implement strict access controls to prevent unauthorized local access to devices, minimizing the chance that an attacker can obtain system privileges. 3. Employ mobile device management (MDM) solutions to enforce security policies, monitor device integrity, and ensure timely patch deployment across organizational assets. 4. Conduct regular security audits and vulnerability assessments on devices using affected chipsets to detect signs of compromise or exploitation attempts. 5. Restrict installation of untrusted applications and enforce application whitelisting to reduce the risk of privilege escalation via malicious apps. 6. Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of maintaining updated devices. 7. Consider network segmentation and endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. 8. For critical environments, evaluate the feasibility of replacing devices with affected chipsets with more secure alternatives until patches are confirmed effective.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd39e

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/14/2026, 1:50:47 AM

Last updated: 2/7/2026, 6:23:40 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats