Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20783: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20783cvecve-2025-20783cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:47:01 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10182882; Issue ID: MSV-4684.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:28:04 UTC

Technical Analysis

CVE-2025-20783 is a security vulnerability identified in the display subsystem of a broad range of MediaTek System on Chips (SoCs), including models MT6739 through MT8883, which are widely used in Android smartphones and tablets. The vulnerability is characterized as an out-of-bounds write (CWE-787) caused by a missing bounds check in the display driver code. This flaw allows a local attacker who has already obtained System-level privileges on the device to perform an out-of-bounds write operation, potentially leading to an escalation of privileges beyond the System level. Notably, exploitation does not require any user interaction, which means that once an attacker has System privileges, they can leverage this vulnerability without further user involvement. The affected Android versions include 14.0, 15.0, and 16.0, indicating that recent and upcoming Android releases are impacted. While no public exploits have been reported yet, the vulnerability's nature suggests that it could be leveraged to compromise device integrity, execute arbitrary code with elevated privileges, or bypass security controls. The issue was reserved in November 2024 and published in January 2026, with MediaTek assigning it the internal issue ID MSV-4684 and patch ID ALPS10182882. The vulnerability affects a wide range of MediaTek chipsets, many of which are popular in mid-range and budget Android devices globally. The absence of a CVSS score necessitates a severity assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, the impact of CVE-2025-20783 can be significant, particularly for those relying on Android devices powered by MediaTek chipsets. The vulnerability enables local privilege escalation, which could allow attackers who have already compromised a device at the System level to gain even higher privileges, potentially leading to full device compromise. This can result in unauthorized access to sensitive corporate data, interception of communications, installation of persistent malware, and disruption of mobile device management controls. Sectors such as finance, healthcare, government, and critical infrastructure, which often use mobile devices for secure communications and operations, are particularly at risk. The lack of user interaction requirement means that once initial compromise occurs, attackers can silently escalate privileges, making detection and response more difficult. Additionally, the broad range of affected chipsets means a large number of devices in use across Europe could be vulnerable, increasing the attack surface. This vulnerability could also undermine trust in mobile device security and complicate compliance with data protection regulations like GDPR if exploited to exfiltrate personal data.

Mitigation Recommendations

To mitigate CVE-2025-20783, European organizations should prioritize the following actions: 1) Ensure that all Android devices using affected MediaTek chipsets are updated promptly with the latest security patches provided by device manufacturers or MediaTek. Since the patch ID is ALPS10182882, organizations should verify patch deployment status with vendors. 2) Restrict System-level privileges to only trusted applications and users, employing strict access controls and application whitelisting to minimize the risk of initial System privilege compromise. 3) Implement robust mobile device management (MDM) solutions that can enforce security policies, monitor device integrity, and detect anomalous privilege escalations. 4) Conduct regular security audits and vulnerability assessments on mobile devices to identify and remediate potential compromises early. 5) Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of applying updates without delay. 6) Consider network segmentation and limiting device access to sensitive systems to reduce the impact of a compromised device. 7) Monitor security advisories from MediaTek, Android, and device manufacturers for any updates or exploit reports related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3c7

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:28:04 AM

Last updated: 1/8/2026, 2:29:14 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats