Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20796: CWE-1285 Specified Index, Position, or Offset in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2025-20796cvecve-2025-20796cwe-1285
Published: Tue Jan 06 2026 (01/06/2026, 01:46:40 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In imgsys, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10314745; Issue ID: MSV-5553.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:24:24 UTC

Technical Analysis

CVE-2025-20796 is a vulnerability identified in the imgsys component of MediaTek chipsets MT6989, MT8796, and MT8893. The root cause is an out-of-bounds write triggered by improper input validation, classified under CWE-1285 (Specified Index, Position, or Offset). This flaw allows a malicious actor who already has local system privileges to perform a local escalation of privilege, potentially gaining higher system control. Exploitation requires user interaction but does not require network access, limiting the attack vector to local or physically proximate attackers. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could manipulate system memory leading to arbitrary code execution or system compromise. Although no active exploits have been reported, the vulnerability is rated with a CVSS 3.1 score of 7.8, indicating a high risk. The issue was reserved in November 2024 and published in January 2026, with a patch identified as ALPS10314745. The affected chipsets are widely used in smartphones, IoT devices, and embedded systems, making this a significant concern for device manufacturers and users.

Potential Impact

The vulnerability poses a significant risk to organizations and individuals using devices with the affected MediaTek chipsets. Successful exploitation can lead to local privilege escalation, allowing attackers to gain elevated control over the device, potentially bypassing security controls and accessing sensitive data. This could result in unauthorized data access, device manipulation, or persistent malware installation. The requirement for local system privileges and user interaction limits remote exploitation but does not eliminate risk in environments where attackers can gain local access, such as through compromised user accounts or physical device access. The broad deployment of these chipsets in consumer electronics and embedded systems means that a wide range of industries, including telecommunications, manufacturing, and consumer electronics, could be impacted. The absence of known exploits in the wild currently reduces immediate risk but underscores the importance of timely patching to prevent future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should prioritize applying the official patch ALPS10314745 as soon as it becomes available from MediaTek or device manufacturers. Until patched, strict access controls should be enforced to limit local system privileges to trusted users only, reducing the risk of privilege escalation. Employing endpoint security solutions that monitor for unusual local activity can help detect exploitation attempts. User education to avoid risky behaviors that could lead to local compromise is also critical. Device manufacturers should conduct thorough testing of firmware updates to ensure the vulnerability is fully addressed. Additionally, implementing hardware-based security features such as Trusted Execution Environments (TEE) can help contain the impact of local exploits. Regularly auditing and updating device firmware and software will further reduce exposure to this and similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3df

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 3/30/2026, 7:24:24 PM

Last updated: 5/9/2026, 9:26:12 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses