Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20789: CWE-201 Information Exposure Through Sent Data in MediaTek, Inc. MT6781, MT6833, MT6853, MT6877, MT6893, MT8196

0
Medium
VulnerabilityCVE-2025-20789cvecve-2025-20789cwe-201
Published: Tue Dec 02 2025 (12/02/2025, 02:35:00 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6781, MT6833, MT6853, MT6877, MT6893, MT8196

Description

In GPU pdma, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS10117741; Issue ID: MSV-4538.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:38:37 UTC

Technical Analysis

CVE-2025-20789 is a vulnerability identified in the GPU pdma (Peripheral Direct Memory Access) component of several MediaTek System-on-Chips (SoCs), specifically MT6781, MT6833, MT6853, MT6877, MT6893, and MT8196. These chipsets are commonly integrated into Android 15.0 devices. The flaw arises from a missing bounds check within the GPU pdma driver, which can result in information disclosure by allowing unauthorized access to memory contents beyond intended boundaries. This leakage occurs locally and does not require elevated privileges, but does require user interaction, such as running a crafted application or engaging with malicious content that triggers the vulnerability. The vulnerability is classified under CWE-201 (Information Exposure Through Sent Data), indicating that sensitive information could be unintentionally transmitted or exposed. The CVSS v3.1 base score is 4.4 (medium), reflecting low complexity in attack vector (local), no privileges required, but user interaction is necessary. The impact primarily affects confidentiality, with no direct effect on integrity or availability. No public exploits have been reported yet, and MediaTek has assigned a patch ID (ALPS10117741) to address the issue. The vulnerability's presence in GPU pdma suggests that attackers could potentially glean sensitive data processed or stored in GPU memory buffers, which may include cryptographic keys, personal data, or other confidential information processed by the GPU. Given the widespread use of these MediaTek chipsets in mid-range to high-end Android smartphones and tablets, the vulnerability poses a tangible risk to end users and organizations relying on such devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-20789 is the potential leakage of sensitive information from devices using affected MediaTek SoCs. This could include corporate data accessed or processed on mobile devices, user credentials, or other confidential information residing in GPU memory. Although the vulnerability requires local access and user interaction, it could be exploited via malicious applications or phishing campaigns targeting employees. The confidentiality breach could lead to data privacy violations under GDPR if personal data is exposed. However, the lack of integrity or availability impact limits the scope of operational disruption. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in environments with high mobile device usage and sensitive data handling. Organizations relying on Android devices with these chipsets should be aware of the risk of information leakage and consider it in their mobile device management and security policies.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the missing bounds check in the GPU pdma driver. 2. Restrict installation of untrusted or unknown applications on devices with affected chipsets to reduce the risk of malicious apps triggering the vulnerability. 3. Implement mobile device management (MDM) solutions to enforce security policies, including app vetting and user interaction controls. 4. Educate users about the risks of interacting with suspicious links or applications that could exploit this vulnerability. 5. Monitor device firmware and OS updates closely and prioritize updates for devices running Android 15.0 on affected MediaTek SoCs. 6. Consider network segmentation and data access controls to limit sensitive data exposure on mobile devices. 7. Use endpoint detection and response (EDR) tools capable of detecting anomalous GPU or memory access patterns that may indicate exploitation attempts. 8. Regularly audit and review permissions and installed applications on corporate mobile devices to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f602c

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/9/2025, 4:38:37 AM

Last updated: 1/18/2026, 6:54:37 PM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats