Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20780: CWE-416 Use After Free in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2025-20780cvecve-2025-20780cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:46:55 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10184061; Issue ID: MSV-4712.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:19:46 UTC

Technical Analysis

CVE-2025-20780 is a use-after-free vulnerability classified under CWE-416 found in the display subsystem of MediaTek chipsets. This vulnerability arises when the system attempts to access memory that has already been freed, leading to memory corruption. The flaw can be exploited locally by an attacker who has already obtained system-level privileges, allowing them to escalate their privileges further. The vulnerability does not require any user interaction, making it easier to exploit once the attacker has initial access. The affected chipsets include a broad range of MediaTek models (e.g., MT6739, MT6761, MT6885, MT6983, MT8186, MT8765, and others), which are widely deployed in smartphones and IoT devices globally. The CVSS v3.1 base score is 7.8, indicating a high severity with high impact on confidentiality, integrity, and availability. The attack vector is local, with low attack complexity and low privileges required, but no user interaction needed. The vulnerability could allow attackers to corrupt memory, potentially leading to arbitrary code execution or system compromise. While no public exploits have been reported yet, the presence of a patch (ALPS10184061) suggests that vendors and device manufacturers should urgently deploy fixes to prevent exploitation. The vulnerability's state is published, and it was reserved in late 2024, indicating recent discovery and disclosure.

Potential Impact

The vulnerability allows local attackers with system privileges to escalate their privileges further, potentially gaining full control over the affected device. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, and disruption of device functionality. Since the flaw affects the display subsystem, it could also be leveraged to execute arbitrary code or cause denial of service through memory corruption. The broad range of affected MediaTek chipsets means millions of devices worldwide could be vulnerable, including smartphones, tablets, and IoT devices. This poses a significant risk to user privacy, device integrity, and availability of services relying on these devices. Organizations relying on MediaTek-based hardware for critical operations may face increased risk of targeted attacks or lateral movement within networks if attackers exploit this vulnerability. The absence of required user interaction increases the likelihood of exploitation in compromised environments.

Mitigation Recommendations

1. Immediately apply the official patch ALPS10184061 provided by MediaTek or device manufacturers to all affected devices. 2. For organizations managing fleets of devices, implement a robust patch management process to ensure timely updates. 3. Restrict local system privilege access to trusted users only, minimizing the risk of attackers gaining the initial system-level access needed to exploit this vulnerability. 4. Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) where supported by the device to reduce exploitation success. 5. Monitor devices for unusual local privilege escalation attempts and memory corruption indicators using endpoint detection and response (EDR) tools. 6. For IoT deployments, segment networks to limit lateral movement from compromised devices. 7. Engage with device vendors to confirm patch availability and deployment status. 8. Educate users and administrators about the risks of granting system-level privileges and encourage the principle of least privilege.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd39e

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 3/30/2026, 7:19:46 PM

Last updated: 5/8/2026, 7:58:46 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses