Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20796: CWE-1285 Specified Index, Position, or Offset in MediaTek, Inc. MT6989, MT8796, MT8893

0
High
VulnerabilityCVE-2025-20796cvecve-2025-20796cwe-1285
Published: Tue Jan 06 2026 (01/06/2026, 01:46:40 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6989, MT8796, MT8893

Description

In imgsys, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10314745; Issue ID: MSV-5553.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:15:29 UTC

Technical Analysis

CVE-2025-20796 is a vulnerability in the MediaTek imgsys driver component found in MT6989, MT8796, and MT8893 chipsets, primarily used in Android 15.0 devices. The flaw is an out-of-bounds write caused by insufficient input validation when handling specified indexes, positions, or offsets, classified under CWE-1285. This vulnerability can be exploited locally by an attacker who already has System-level privileges, requiring user interaction to trigger the flaw. Successful exploitation could lead to escalation of privileges, allowing the attacker to gain higher control over the system, potentially compromising confidentiality, integrity, and availability of the device. The vulnerability has a CVSS v3.1 score of 7.8, reflecting high severity with local attack vector, low attack complexity, and requiring privileges but no user interaction. MediaTek has published a patch identified as ALPS10314745 to address this issue. No public exploits have been reported yet, but the vulnerability poses a significant risk to devices using these chipsets if left unpatched.

Potential Impact

The vulnerability could allow attackers with existing System privileges to escalate their access further, potentially gaining full control over the affected device. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, and disruption of device functionality. Since the flaw resides in a core media system driver, exploitation could affect a wide range of applications relying on media processing, increasing the risk of widespread compromise. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk in scenarios where attackers have physical or local access, such as through malicious apps or insider threats. The impact is particularly critical for organizations deploying devices with these MediaTek chipsets in sensitive environments, as it could facilitate persistent and stealthy attacks.

Mitigation Recommendations

Organizations should prioritize deploying the patch ALPS10314745 provided by MediaTek as soon as it becomes available for their devices. Until patched, restrict local access to devices running affected chipsets by enforcing strict device usage policies and limiting installation of untrusted applications that could trigger the vulnerability. Employ mobile device management (MDM) solutions to monitor and control device configurations and app permissions. Conduct regular security audits and user training to reduce the risk of social engineering that could lead to the required user interaction for exploitation. Additionally, implement runtime protections such as application sandboxing and privilege separation to minimize the impact of potential privilege escalations. Monitoring for unusual local activity on devices with these chipsets can also help detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3df

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 2/27/2026, 7:15:29 AM

Last updated: 3/24/2026, 12:32:42 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses