Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20782: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20782cvecve-2025-20782cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:59 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10182882; Issue ID: MSV-4685.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:28:18 UTC

Technical Analysis

CVE-2025-20782 is a security vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek System on Chips (SoCs), including MT6739 through MT8883 series, integrated into many Android devices running versions 14.0, 15.0, and 16.0. The vulnerability exists in the display subsystem where a missing bounds check allows an attacker with System-level privileges to perform an out-of-bounds write operation. This memory corruption flaw can lead to local escalation of privileges, potentially enabling an attacker to execute arbitrary code or compromise system integrity. The flaw does not require user interaction, meaning once an attacker has System privileges—possibly through another exploit—they can leverage this vulnerability to gain higher privileges or persistent control. The vulnerability was reserved in November 2024 and published in January 2026, with no known public exploits reported yet. The affected MediaTek chipsets are widely used in mid-range and budget smartphones globally, including many devices popular in Europe. The absence of a CVSS score necessitates a severity assessment based on impact and exploitability factors. The vulnerability's exploitation requires prior System privilege, limiting initial attack vectors but increasing risk in chained attacks. The issue is identified internally by MediaTek as MSV-4685 and patched under ALPS10182882, though patch distribution depends on device manufacturers and carriers.

Potential Impact

For European organizations, the impact of CVE-2025-20782 can be significant, especially for sectors relying heavily on mobile devices for sensitive communications, such as finance, healthcare, and government. The vulnerability enables local privilege escalation, which could allow attackers who have already compromised a device at the System level to gain full control, bypass security controls, or install persistent malware. This could lead to data breaches, unauthorized access to corporate resources, and disruption of mobile-dependent operations. Since the vulnerability affects many MediaTek chipsets common in smartphones sold across Europe, the attack surface is broad. The lack of user interaction requirement increases the risk in environments where devices may be targeted by sophisticated threat actors. Additionally, compromised devices could be used as pivot points for lateral movement within corporate networks. The impact on device stability and integrity could also affect availability, causing operational disruptions. Organizations with Bring Your Own Device (BYOD) policies may face increased exposure due to diverse device ecosystems.

Mitigation Recommendations

To mitigate CVE-2025-20782, European organizations should: 1) Prioritize updating device firmware and operating system patches from device manufacturers and carriers as soon as they become available, ensuring MediaTek chipset devices receive the ALPS10182882 patch or equivalent. 2) Implement strict mobile device management (MDM) policies to enforce timely updates and restrict installation of untrusted applications that could lead to initial System privilege compromise. 3) Employ endpoint detection and response (EDR) solutions capable of monitoring for unusual privilege escalation attempts on mobile devices. 4) Limit the exposure of devices with MediaTek chipsets in sensitive environments or consider alternative hardware with better security track records where feasible. 5) Educate users about the risks of rooting or jailbreaking devices, which can increase the likelihood of System privilege compromise. 6) Monitor threat intelligence feeds for emerging exploits targeting this vulnerability to respond rapidly. 7) Collaborate with device vendors to confirm patch availability and deployment timelines. 8) Consider network segmentation and zero-trust principles to reduce the impact of compromised mobile devices on broader corporate networks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd3a4

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/6/2026, 2:28:18 AM

Last updated: 1/8/2026, 2:29:13 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats