Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20787: CWE-416 Use After Free in MediaTek, Inc. MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8796

0
Medium
VulnerabilityCVE-2025-20787cvecve-2025-20787cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:09 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, MT8796

Description

In display, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10149879; Issue ID: MSV-4658.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:26:50 UTC

Technical Analysis

CVE-2025-20787 is a use-after-free vulnerability identified in the display subsystem of multiple MediaTek chipsets, including MT2718, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8196, MT8676, MT8678, and MT8796. These chipsets are integrated into a wide range of Android devices running versions 14.0 through 16.0. The vulnerability arises from improper handling of memory in the display driver, specifically a use-after-free condition (CWE-416), which can lead to memory corruption. This memory corruption can be exploited to escalate privileges locally, but only after an attacker has already obtained System-level privileges on the device. Notably, exploitation does not require any user interaction, which increases the risk of automated exploitation in compromised environments. The vulnerability could allow attackers to execute arbitrary code with elevated privileges or cause denial of service by destabilizing the system. No public exploit code or active exploitation has been reported to date. The vendor has assigned Patch ID ALPS10149879 and Issue ID MSV-4658 to address this issue, though patch links are not yet publicly available. The vulnerability was reserved in November 2024 and published in January 2026. The broad range of affected chipsets indicates a widespread impact across many devices using MediaTek SoCs. The lack of a CVSS score necessitates an independent severity assessment based on the technical details and potential impact.

Potential Impact

For European organizations, the primary impact of CVE-2025-20787 lies in the potential for local privilege escalation on devices using affected MediaTek chipsets. While the vulnerability requires the attacker to have already compromised the device at the System privilege level, successful exploitation could allow attackers to gain even higher privileges, potentially leading to full device compromise, unauthorized access to sensitive data, or persistent malware installation. This is particularly concerning for organizations relying on mobile devices for sensitive communications, remote work, or as part of their operational technology environments. The lack of user interaction needed for exploitation means that once initial access is gained, attackers can escalate privileges stealthily without alerting users. Given the widespread use of MediaTek chipsets in consumer and enterprise mobile devices, the vulnerability could affect a large number of endpoints. This could facilitate lateral movement within corporate networks or enable attackers to bypass security controls enforced at lower privilege levels. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as patches are not yet widely available. The impact is heightened in sectors with stringent data protection requirements under GDPR, where device compromise could lead to data breaches and regulatory penalties.

Mitigation Recommendations

To mitigate CVE-2025-20787 effectively, organizations should prioritize the following actions: 1) Monitor MediaTek and device vendor advisories closely and apply security patches (Patch ID ALPS10149879) as soon as they become available to remediate the vulnerability. 2) Implement strict privilege separation on mobile devices to limit the ability of attackers to gain System-level access initially, thereby reducing the risk of privilege escalation. 3) Employ mobile device management (MDM) solutions to enforce security policies, control application installations, and monitor for suspicious activities indicative of privilege escalation attempts. 4) Utilize runtime protections such as memory protection mechanisms (e.g., ASLR, DEP) and integrity checks to detect and prevent exploitation of memory corruption vulnerabilities. 5) Conduct regular security audits and penetration testing focused on mobile endpoints to identify potential initial access vectors that could lead to exploitation of this vulnerability. 6) Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of timely updates. 7) Restrict physical and remote access to devices to minimize the attack surface. 8) Consider network segmentation to isolate mobile devices from critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3d3

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:26:50 AM

Last updated: 1/8/2026, 2:28:36 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats