Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20788: CWE-1262 Improper Access Control for Register Interface in MediaTek, Inc. MT6991, MT8196

0
Medium
VulnerabilityCVE-2025-20788cvecve-2025-20788cwe-1262
Published: Tue Dec 02 2025 (12/02/2025, 02:34:51 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6991, MT8196

Description

In GPU pdma, there is a possible memory corruption due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117735; Issue ID: MSV-4539.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:22:14 UTC

Technical Analysis

CVE-2025-20788 is a security vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) register interface of MediaTek's MT6991 and MT8196 chipsets. The root cause is an improper access control (CWE-1262) where a missing permission check allows local users to perform unauthorized operations on the GPU's register interface. This can lead to memory corruption within the GPU subsystem, which in turn can cause a denial of service (DoS) condition on affected devices. The vulnerability requires local access and user interaction to exploit, meaning an attacker must have some level of access to the device and convince or trick the user into performing an action that triggers the flaw. The affected versions include devices running Android 15.0 that incorporate these MediaTek chipsets. Although the vulnerability does not grant additional execution privileges or remote code execution capabilities, the resulting DoS can disrupt device functionality, impacting availability. No public exploits have been reported yet, and no CVSS score has been assigned. The issue was reserved in November 2024 and published in December 2025, with a patch referenced by MediaTek internally but not publicly linked. This vulnerability highlights the importance of strict access control on hardware interfaces, especially in complex SoCs used in mobile and embedded devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-20788 is the potential for local denial of service on devices using MediaTek MT6991 and MT8196 chipsets running Android 15.0. This could affect smartphones, tablets, and potentially IoT devices that rely on these chipsets, leading to device crashes or reboots, disrupting business operations, communications, or critical IoT functions. While no privilege escalation or data breach is directly enabled by this vulnerability, the loss of availability can impact productivity and service continuity. Organizations with mobile device fleets or embedded systems using these chipsets may face increased support costs and operational interruptions. The requirement for user interaction limits the risk somewhat but does not eliminate it, especially in environments where users might be socially engineered or exposed to malicious apps. The lack of known exploits currently reduces immediate risk but patching and mitigation should be prioritized to prevent future exploitation. The vulnerability also underscores the need for robust endpoint security and user training in European enterprises.

Mitigation Recommendations

1. Apply patches promptly once MediaTek or device manufacturers release updates addressing CVE-2025-20788. Monitor vendor advisories closely. 2. Restrict local user privileges on affected devices to minimize the risk of exploitation by limiting who can interact with the GPU register interface. 3. Implement strict application whitelisting and control installation of untrusted or unknown apps that could trigger the vulnerability. 4. Educate users about the risks of interacting with suspicious prompts or applications that could exploit local vulnerabilities. 5. Employ mobile device management (MDM) solutions to enforce security policies and monitor device health and behavior for signs of exploitation attempts. 6. For IoT deployments using these chipsets, isolate affected devices on segmented networks to limit impact of potential DoS conditions. 7. Monitor system logs and GPU subsystem behavior for anomalies indicative of memory corruption or crashes. 8. Consider fallback or redundancy strategies for critical devices to maintain availability in case of DoS events.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6029

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/2/2025, 3:22:14 AM

Last updated: 12/5/2025, 12:09:32 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats