Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20785: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20785cvecve-2025-20785cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:05 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10149882; Issue ID: MSV-4677.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:27:25 UTC

Technical Analysis

CVE-2025-20785 is a use-after-free vulnerability categorized under CWE-416, affecting the display subsystem in a wide range of MediaTek System-on-Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, and many others, spanning multiple generations. This vulnerability arises from improper memory management where freed memory is accessed, leading to memory corruption. The flaw exists in devices running Android versions 14.0 through 16.0 that incorporate these MediaTek chipsets. Exploitation of this vulnerability can result in local escalation of privilege, but only if the attacker has already obtained System-level privileges on the device. Notably, exploitation does not require any user interaction, which means that once the attacker has System access, they can leverage this flaw to gain higher privileges or compromise system integrity further. The vulnerability was publicly disclosed in early 2026, with no known exploits in the wild at the time of publication. The lack of a CVSS score complicates severity assessment, but the nature of the vulnerability—use-after-free leading to privilege escalation without user interaction—indicates a significant security risk. The vulnerability affects a broad spectrum of MediaTek SoCs widely used in smartphones and embedded devices, making the attack surface extensive. The patch for this issue is identified as ALPS10149882, but no direct patch links are provided, indicating that affected parties must rely on vendor updates. The vulnerability's exploitation could allow attackers to bypass security controls, compromise device integrity, and potentially facilitate further attacks or persistence on the device.

Potential Impact

For European organizations, the impact of CVE-2025-20785 could be substantial, especially for those relying on mobile devices powered by MediaTek chipsets. The vulnerability enables local privilege escalation, which can undermine device security, allowing attackers to gain unauthorized access to sensitive data or system functions. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure where mobile device security is paramount. Since exploitation requires prior System-level access, the vulnerability primarily elevates risk in scenarios where initial compromise has already occurred, potentially enabling attackers to solidify control or evade detection. The absence of user interaction in exploitation increases the risk of automated or stealthy attacks. Additionally, the widespread use of affected MediaTek SoCs in consumer and enterprise devices across Europe means a large number of endpoints could be vulnerable, increasing the attack surface. The vulnerability could also impact supply chain security if devices are used in industrial or operational technology environments. Overall, the threat could lead to data breaches, loss of device integrity, and increased difficulty in incident response and remediation.

Mitigation Recommendations

1. Immediate application of vendor-provided patches (ALPS10149882) as soon as they become available is critical to remediate the vulnerability. 2. Organizations should maintain an accurate inventory of devices using affected MediaTek chipsets and Android versions 14.0 to 16.0 to prioritize patch deployment. 3. Employ strict privilege separation and limit System-level access on devices to reduce the risk of initial compromise that could lead to exploitation. 4. Implement mobile device management (MDM) solutions to enforce security policies, monitor device integrity, and detect anomalous behavior indicative of privilege escalation attempts. 5. Use runtime protection and exploit mitigation technologies where possible to detect and prevent use-after-free exploitation. 6. Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of timely updates. 7. For critical environments, consider network segmentation and restricting device connectivity to minimize exposure. 8. Monitor threat intelligence feeds for any emerging exploits targeting this vulnerability to adjust defenses accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3cd

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:27:25 AM

Last updated: 1/8/2026, 2:28:42 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats