CVE-2025-20789: CWE-201 Information Exposure Through Sent Data in MediaTek, Inc. MT6781, MT6833, MT6853, MT6877, MT6893, MT8196
In GPU pdma, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117741; Issue ID: MSV-4538.
AI Analysis
Technical Summary
CVE-2025-20789 is a vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) component of several MediaTek System-on-Chips (SoCs), specifically MT6781, MT6833, MT6853, MT6877, MT6893, and MT8196. These chipsets are commonly integrated into Android 15.0 devices. The flaw arises from a missing bounds check within the GPU pdma driver, which can result in information disclosure by allowing unauthorized access to memory contents beyond intended boundaries. This leakage occurs locally and does not require elevated privileges, but does require user interaction, such as running a crafted application or engaging with malicious content that triggers the vulnerability. The vulnerability is classified under CWE-201 (Information Exposure Through Sent Data), indicating that sensitive information could be unintentionally transmitted or exposed. The CVSS v3.1 base score is 4.4 (medium), reflecting low complexity in attack vector (local), no privileges required, but user interaction is necessary. The impact primarily affects confidentiality, with no direct effect on integrity or availability. No public exploits have been reported yet, and MediaTek has assigned a patch ID (ALPS10117741) to address the issue. The vulnerability's presence in GPU pdma suggests that attackers could potentially glean sensitive data processed or stored in GPU memory buffers, which may include cryptographic keys, personal data, or other confidential information processed by the GPU. Given the widespread use of these MediaTek chipsets in mid-range to high-end Android smartphones and tablets, the vulnerability poses a tangible risk to end users and organizations relying on such devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20789 is the potential leakage of sensitive information from devices using affected MediaTek SoCs. This could include corporate data accessed or processed on mobile devices, user credentials, or other confidential information residing in GPU memory. Although the vulnerability requires local access and user interaction, it could be exploited via malicious applications or phishing campaigns targeting employees. The confidentiality breach could lead to data privacy violations under GDPR if personal data is exposed. However, the lack of integrity or availability impact limits the scope of operational disruption. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in environments with high mobile device usage and sensitive data handling. Organizations relying on Android devices with these chipsets should be aware of the risk of information leakage and consider it in their mobile device management and security policies.
Mitigation Recommendations
1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the missing bounds check in the GPU pdma driver. 2. Restrict installation of untrusted or unknown applications on devices with affected chipsets to reduce the risk of malicious apps triggering the vulnerability. 3. Implement mobile device management (MDM) solutions to enforce security policies, including app vetting and user interaction controls. 4. Educate users about the risks of interacting with suspicious links or applications that could exploit this vulnerability. 5. Monitor device firmware and OS updates closely and prioritize updates for devices running Android 15.0 on affected MediaTek SoCs. 6. Consider network segmentation and data access controls to limit sensitive data exposure on mobile devices. 7. Use endpoint detection and response (EDR) tools capable of detecting anomalous GPU or memory access patterns that may indicate exploitation attempts. 8. Regularly audit and review permissions and installed applications on corporate mobile devices to minimize attack surface.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland
CVE-2025-20789: CWE-201 Information Exposure Through Sent Data in MediaTek, Inc. MT6781, MT6833, MT6853, MT6877, MT6893, MT8196
Description
In GPU pdma, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117741; Issue ID: MSV-4538.
AI-Powered Analysis
Technical Analysis
CVE-2025-20789 is a vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) component of several MediaTek System-on-Chips (SoCs), specifically MT6781, MT6833, MT6853, MT6877, MT6893, and MT8196. These chipsets are commonly integrated into Android 15.0 devices. The flaw arises from a missing bounds check within the GPU pdma driver, which can result in information disclosure by allowing unauthorized access to memory contents beyond intended boundaries. This leakage occurs locally and does not require elevated privileges, but does require user interaction, such as running a crafted application or engaging with malicious content that triggers the vulnerability. The vulnerability is classified under CWE-201 (Information Exposure Through Sent Data), indicating that sensitive information could be unintentionally transmitted or exposed. The CVSS v3.1 base score is 4.4 (medium), reflecting low complexity in attack vector (local), no privileges required, but user interaction is necessary. The impact primarily affects confidentiality, with no direct effect on integrity or availability. No public exploits have been reported yet, and MediaTek has assigned a patch ID (ALPS10117741) to address the issue. The vulnerability's presence in GPU pdma suggests that attackers could potentially glean sensitive data processed or stored in GPU memory buffers, which may include cryptographic keys, personal data, or other confidential information processed by the GPU. Given the widespread use of these MediaTek chipsets in mid-range to high-end Android smartphones and tablets, the vulnerability poses a tangible risk to end users and organizations relying on such devices.
Potential Impact
For European organizations, the primary impact of CVE-2025-20789 is the potential leakage of sensitive information from devices using affected MediaTek SoCs. This could include corporate data accessed or processed on mobile devices, user credentials, or other confidential information residing in GPU memory. Although the vulnerability requires local access and user interaction, it could be exploited via malicious applications or phishing campaigns targeting employees. The confidentiality breach could lead to data privacy violations under GDPR if personal data is exposed. However, the lack of integrity or availability impact limits the scope of operational disruption. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in environments with high mobile device usage and sensitive data handling. Organizations relying on Android devices with these chipsets should be aware of the risk of information leakage and consider it in their mobile device management and security policies.
Mitigation Recommendations
1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the missing bounds check in the GPU pdma driver. 2. Restrict installation of untrusted or unknown applications on devices with affected chipsets to reduce the risk of malicious apps triggering the vulnerability. 3. Implement mobile device management (MDM) solutions to enforce security policies, including app vetting and user interaction controls. 4. Educate users about the risks of interacting with suspicious links or applications that could exploit this vulnerability. 5. Monitor device firmware and OS updates closely and prioritize updates for devices running Android 15.0 on affected MediaTek SoCs. 6. Consider network segmentation and data access controls to limit sensitive data exposure on mobile devices. 7. Use endpoint detection and response (EDR) tools capable of detecting anomalous GPU or memory access patterns that may indicate exploitation attempts. 8. Regularly audit and review permissions and installed applications on corporate mobile devices to minimize attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f602c
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/9/2025, 4:38:37 AM
Last updated: 1/18/2026, 6:54:37 PM
Views: 121
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.