Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20786: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20786cvecve-2025-20786cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:07 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10149882; Issue ID: MSV-4673.

AI-Powered Analysis

AILast updated: 01/14/2026, 00:51:12 UTC

Technical Analysis

CVE-2025-20786 is a use-after-free vulnerability classified under CWE-416, present in the display subsystem of a broad range of MediaTek chipsets including MT6739, MT6761, MT6765, and many others spanning multiple generations. The flaw arises from improper memory management where a freed memory region is accessed again, leading to memory corruption. This can be exploited locally by an attacker who already possesses system-level privileges to escalate their privileges further, potentially gaining higher control over the device. The vulnerability affects devices running Android versions 14.0 through 16.0, which are recent and upcoming Android releases. Exploitation does not require user interaction, increasing the risk if system privileges are compromised. The CVSS v3.1 score of 6.7 reflects a medium severity with a vector indicating local attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the broad chipset coverage and impact on core device functionality make this a significant concern. The issue was reserved in November 2024 and published in January 2026, with patches identified but not directly linked in the provided data. This vulnerability could be leveraged in multi-stage attacks where initial system access is gained through other means, then escalated via this flaw to compromise device security further.

Potential Impact

For European organizations, the impact of CVE-2025-20786 can be substantial, especially those relying on Android devices powered by affected MediaTek chipsets. The vulnerability allows local privilege escalation, which can lead to full device compromise if combined with other exploits granting system access. This could result in unauthorized access to sensitive corporate data, interception of communications, or deployment of persistent malware. Given the widespread use of MediaTek chipsets in mid-range and budget Android devices, many employees' mobile devices could be vulnerable, increasing the attack surface. The lack of required user interaction means that once system privileges are obtained, exploitation can be automated or triggered silently. This elevates risks in environments where device security policies are lax or where devices are used to access corporate networks. Additionally, the integrity and availability of device functions could be compromised, potentially disrupting business operations. The threat is particularly relevant for sectors with high mobile device usage such as finance, healthcare, and government agencies across Europe.

Mitigation Recommendations

Organizations should prioritize deploying official patches from device manufacturers or MediaTek as soon as they become available to remediate this vulnerability. Until patches are applied, restricting system-level access to trusted applications and enforcing strict privilege separation can reduce exploitation risk. Employ mobile device management (MDM) solutions to monitor and control device configurations and installed applications. Regularly audit devices for signs of privilege escalation or unusual behavior indicative of exploitation attempts. Educate users and administrators about the risks of granting system-level privileges and the importance of applying updates promptly. For critical environments, consider isolating vulnerable devices from sensitive networks or data until patched. Collaborate with device vendors to obtain timely security updates and verify patch deployment. Additionally, implement endpoint detection and response (EDR) tools capable of detecting anomalous memory corruption or privilege escalation activities on mobile devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3d0

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 12:51:12 AM

Last updated: 2/6/2026, 1:30:26 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats