Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20785: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20785cvecve-2025-20785cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:05 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2025-20785 is a use-after-free vulnerability in the display component of multiple MediaTek SoCs used in Android devices running versions 14. 0 to 16. 0. This memory corruption flaw can lead to local privilege escalation if an attacker already has system-level privileges. Exploitation does not require user interaction but does require prior system privilege access. The vulnerability affects a broad range of MediaTek chipsets commonly found in many Android smartphones. The CVSS score is 6. 7, indicating a medium severity with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Patching is essential to mitigate the risk.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:52:06 UTC

Technical Analysis

CVE-2025-20785 is a use-after-free vulnerability classified under CWE-416, affecting the display subsystem of numerous MediaTek System-on-Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, and many others. These SoCs are integrated into a wide range of Android smartphones operating on Android versions 14.0 through 16.0. The vulnerability arises from improper memory management in the display component, where a freed memory region is accessed again, leading to memory corruption. This flaw can be exploited locally by an attacker who already possesses system-level privileges to escalate their privileges further, potentially gaining higher control over the device. The attack vector is local, requiring no user interaction, but does require the attacker to have already compromised system privileges, which limits initial exploitation scope. The vulnerability impacts confidentiality, integrity, and availability, as it can allow unauthorized access to sensitive data, modification of system behavior, or denial of service. The CVSS v3.1 score of 6.7 reflects a medium severity with low attack complexity but requiring high privileges. No public exploits have been reported yet, but the broad range of affected chipsets and Android versions makes this a significant concern. The issue was reserved in November 2024 and published in January 2026, with MediaTek assigning the patch ID ALPS10149882. Organizations should apply vendor patches promptly once available to mitigate risks.

Potential Impact

For European organizations, the impact of CVE-2025-20785 can be significant, especially those relying on Android devices powered by affected MediaTek chipsets. The vulnerability enables local privilege escalation, which could allow attackers who have already compromised system-level access to gain full control over the device. This can lead to unauthorized access to sensitive corporate data, manipulation of device functions, or disruption of services. Industries with high mobile device usage, such as finance, healthcare, and government sectors, are particularly at risk. The lack of user interaction for exploitation increases the risk of automated or stealthy attacks once initial access is obtained. Given the widespread use of MediaTek SoCs in mid-range and budget smartphones popular in Europe, the potential attack surface is large. Furthermore, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity and broad impact necessitate urgent attention.

Mitigation Recommendations

European organizations should implement a multi-layered approach to mitigate CVE-2025-20785. First, ensure all Android devices using affected MediaTek chipsets are updated to the latest firmware versions containing the patch ALPS10149882 or subsequent vendor releases. Device management policies should enforce timely OS and firmware updates. Secondly, restrict system-level access on devices by enforcing the principle of least privilege and using mobile device management (MDM) solutions to monitor and control privilege escalations. Employ runtime protection and behavior monitoring tools to detect anomalous activities indicative of exploitation attempts. Additionally, educate users and administrators about the risks of granting system privileges to untrusted applications or processes. For high-security environments, consider device hardening techniques such as disabling unnecessary services and enforcing secure boot mechanisms. Finally, maintain an inventory of devices with affected chipsets to prioritize patch deployment and incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.401Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3cd

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 1:52:06 AM

Last updated: 2/7/2026, 4:40:46 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats