Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20795: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8195, MT8196, MT8370, MT8390, MT8391, MT8395, MT8676, MT8678, MT8696, MT8755, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20795cvecve-2025-20795cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:29 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT8186, MT8188, MT8195, MT8196, MT8370, MT8390, MT8391, MT8395, MT8676, MT8678, MT8696, MT8755, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893

Description

In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10276761; Issue ID: MSV-5141.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:25:59 UTC

Technical Analysis

CVE-2025-20795 is a security vulnerability classified under CWE-787 (Out-of-bounds Write) found in the KeyInstall component of MediaTek chipsets. The affected chipsets include a broad range of MediaTek models (MT2718 through MT8893 series) embedded in many Android devices running versions 13.0 to 16.0. The vulnerability stems from a missing bounds check during memory operations, which can lead to an out-of-bounds write condition. This flaw allows a local attacker who already has System-level privileges on the device to escalate their privileges further, potentially gaining higher-level control or executing arbitrary code with elevated rights. Notably, exploitation does not require any user interaction, which means once System privileges are obtained, the attacker can leverage this vulnerability silently. Although there are no known exploits in the wild at the time of publication, the vulnerability's presence in widely used chipsets makes it a critical concern for device manufacturers and users. The vulnerability affects the confidentiality, integrity, and availability of the device by enabling privilege escalation attacks that could bypass security controls. The patch for this issue is identified as ALPS10276761, but no public patch links are currently available. The vulnerability was reserved in November 2024 and published in January 2026, indicating a recent discovery and disclosure. MediaTek chipsets are commonly used in a variety of smartphones and IoT devices, making this vulnerability relevant to a broad user base. The lack of a CVSS score necessitates an independent severity assessment based on the technical details and potential impact.

Potential Impact

For European organizations, the impact of CVE-2025-20795 can be significant, especially for those relying on mobile devices powered by MediaTek chipsets. The vulnerability allows local privilege escalation from System-level access, which could enable attackers to bypass security mechanisms, install persistent malware, or exfiltrate sensitive data. This is particularly concerning for sectors such as finance, healthcare, and government, where mobile device security is critical. The absence of required user interaction means that once an attacker gains System privileges—potentially through other vulnerabilities or social engineering—they can exploit this flaw without alerting the user. This could lead to compromised device integrity, unauthorized access to confidential information, and disruption of services. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations within Europe. The broad range of affected MediaTek chipsets means that many consumer and enterprise devices are potentially vulnerable, increasing the attack surface. Given the increasing use of mobile devices for corporate communications and data access, this vulnerability poses a risk to organizational security posture and compliance with data protection regulations such as GDPR.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the out-of-bounds write vulnerability in KeyInstall. 2. Restrict System-level privileges on devices to only trusted applications and services, minimizing the risk of privilege escalation. 3. Implement strict mobile device management (MDM) policies to monitor and control the installation of applications and system modifications. 4. Employ runtime protection and integrity checking tools on devices to detect anomalous behavior indicative of exploitation attempts. 5. Educate users and administrators about the risks of granting elevated privileges and the importance of applying security updates promptly. 6. For organizations deploying custom Android builds or firmware, conduct thorough code audits and testing to ensure the vulnerability is patched. 7. Monitor threat intelligence feeds for any emerging exploits targeting this vulnerability to enable rapid response. 8. Limit physical and remote access to devices to reduce the chance of an attacker obtaining System privileges initially. 9. Consider network segmentation and endpoint detection to contain potential compromises stemming from exploited devices. 10. Collaborate with vendors and security communities to stay informed about updates and mitigation strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3dc

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:25:59 AM

Last updated: 1/8/2026, 8:00:11 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats