CVE-2025-20788: CWE-1262 Improper Access Control for Register Interface in MediaTek, Inc. MT6991, MT8196
In GPU pdma, there is a possible memory corruption due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117735; Issue ID: MSV-4539.
AI Analysis
Technical Summary
CVE-2025-20788 is a security vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) register interface of MediaTek's MT6991 and MT8196 chipsets. The root cause is an improper access control (CWE-1262) where a missing permission check allows local users to perform unauthorized operations on the GPU's register interface. This can lead to memory corruption within the GPU subsystem, which in turn can cause a denial of service (DoS) condition on affected devices. The vulnerability requires local access and user interaction to exploit, meaning an attacker must have some level of access to the device and convince or trick the user into performing an action that triggers the flaw. The affected versions include devices running Android 15.0 that incorporate these MediaTek chipsets. Although the vulnerability does not grant additional execution privileges or remote code execution capabilities, the resulting DoS can disrupt device functionality, impacting availability. No public exploits have been reported yet, and no CVSS score has been assigned. The issue was reserved in November 2024 and published in December 2025, with a patch referenced by MediaTek internally but not publicly linked. This vulnerability highlights the importance of strict access control on hardware interfaces, especially in complex SoCs used in mobile and embedded devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20788 is the potential for local denial of service on devices using MediaTek MT6991 and MT8196 chipsets running Android 15.0. This could affect smartphones, tablets, and potentially IoT devices that rely on these chipsets, leading to device crashes or reboots, disrupting business operations, communications, or critical IoT functions. While no privilege escalation or data breach is directly enabled by this vulnerability, the loss of availability can impact productivity and service continuity. Organizations with mobile device fleets or embedded systems using these chipsets may face increased support costs and operational interruptions. The requirement for user interaction limits the risk somewhat but does not eliminate it, especially in environments where users might be socially engineered or exposed to malicious apps. The lack of known exploits currently reduces immediate risk but patching and mitigation should be prioritized to prevent future exploitation. The vulnerability also underscores the need for robust endpoint security and user training in European enterprises.
Mitigation Recommendations
1. Apply patches promptly once MediaTek or device manufacturers release updates addressing CVE-2025-20788. Monitor vendor advisories closely. 2. Restrict local user privileges on affected devices to minimize the risk of exploitation by limiting who can interact with the GPU register interface. 3. Implement strict application whitelisting and control installation of untrusted or unknown apps that could trigger the vulnerability. 4. Educate users about the risks of interacting with suspicious prompts or applications that could exploit local vulnerabilities. 5. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and behavior for signs of exploitation attempts. 6. For IoT deployments using these chipsets, isolate affected devices on segmented networks to limit impact of potential DoS conditions. 7. Monitor system logs and GPU subsystem behavior for anomalies indicative of memory corruption or crashes. 8. Consider fallback or redundancy strategies for critical devices to maintain availability in case of DoS events.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-20788: CWE-1262 Improper Access Control for Register Interface in MediaTek, Inc. MT6991, MT8196
Description
In GPU pdma, there is a possible memory corruption due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117735; Issue ID: MSV-4539.
AI-Powered Analysis
Technical Analysis
CVE-2025-20788 is a security vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) register interface of MediaTek's MT6991 and MT8196 chipsets. The root cause is an improper access control (CWE-1262) where a missing permission check allows local users to perform unauthorized operations on the GPU's register interface. This can lead to memory corruption within the GPU subsystem, which in turn can cause a denial of service (DoS) condition on affected devices. The vulnerability requires local access and user interaction to exploit, meaning an attacker must have some level of access to the device and convince or trick the user into performing an action that triggers the flaw. The affected versions include devices running Android 15.0 that incorporate these MediaTek chipsets. Although the vulnerability does not grant additional execution privileges or remote code execution capabilities, the resulting DoS can disrupt device functionality, impacting availability. No public exploits have been reported yet, and no CVSS score has been assigned. The issue was reserved in November 2024 and published in December 2025, with a patch referenced by MediaTek internally but not publicly linked. This vulnerability highlights the importance of strict access control on hardware interfaces, especially in complex SoCs used in mobile and embedded devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20788 is the potential for local denial of service on devices using MediaTek MT6991 and MT8196 chipsets running Android 15.0. This could affect smartphones, tablets, and potentially IoT devices that rely on these chipsets, leading to device crashes or reboots, disrupting business operations, communications, or critical IoT functions. While no privilege escalation or data breach is directly enabled by this vulnerability, the loss of availability can impact productivity and service continuity. Organizations with mobile device fleets or embedded systems using these chipsets may face increased support costs and operational interruptions. The requirement for user interaction limits the risk somewhat but does not eliminate it, especially in environments where users might be socially engineered or exposed to malicious apps. The lack of known exploits currently reduces immediate risk but patching and mitigation should be prioritized to prevent future exploitation. The vulnerability also underscores the need for robust endpoint security and user training in European enterprises.
Mitigation Recommendations
1. Apply patches promptly once MediaTek or device manufacturers release updates addressing CVE-2025-20788. Monitor vendor advisories closely. 2. Restrict local user privileges on affected devices to minimize the risk of exploitation by limiting who can interact with the GPU register interface. 3. Implement strict application whitelisting and control installation of untrusted or unknown apps that could trigger the vulnerability. 4. Educate users about the risks of interacting with suspicious prompts or applications that could exploit local vulnerabilities. 5. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and behavior for signs of exploitation attempts. 6. For IoT deployments using these chipsets, isolate affected devices on segmented networks to limit impact of potential DoS conditions. 7. Monitor system logs and GPU subsystem behavior for anomalies indicative of memory corruption or crashes. 8. Consider fallback or redundancy strategies for critical devices to maintain availability in case of DoS events.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f6029
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/2/2025, 3:22:14 AM
Last updated: 12/5/2025, 12:09:32 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13373: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Advantech iView
HighCVE-2025-66564: CWE-405: Asymmetric Resource Consumption (Amplification) in sigstore timestamp-authority
HighCVE-2025-66559: CWE-129: Improper Validation of Array Index in taikoxyz taiko-mono
HighCVE-2025-66563: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in monkeytypegame monkeytype
HighCVE-2025-66561: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Syslifters sysreptor
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.