Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20798: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6765, MT6768, MT6781, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6893, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8367, MT8391, MT8676, MT8678, MT8696, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20798cvecve-2025-20798cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:43 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6765, MT6768, MT6781, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6893, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8367, MT8391, MT8676, MT8678, MT8696, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893

Description

CVE-2025-20798 is a high-severity out-of-bounds write vulnerability in MediaTek chipsets affecting multiple models used in Android devices running versions 14. 0 to 16. 0. The flaw exists in the battery component due to a missing bounds check, allowing a local attacker with System privileges to escalate their privileges further without user interaction. Exploitation requires prior System-level access but can lead to full compromise of confidentiality, integrity, and availability. No known exploits are currently in the wild, and patches have been identified but not linked. European organizations using devices with these MediaTek chipsets are at risk, especially in countries with high smartphone penetration and reliance on affected devices. Mitigation involves applying vendor patches promptly, restricting System-level access, and monitoring for anomalous behavior related to battery subsystem operations. Countries like Germany, France, Italy, Spain, and the UK are most likely affected due to market share and strategic importance. The vulnerability scores 7.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:53:39 UTC

Technical Analysis

CVE-2025-20798 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a wide range of MediaTek chipsets, including MT2718, MT6765, MT6768, MT6781, MT6833, MT6835, MT6853, MT6855, MT6877, MT6879, MT6893, MT6985, MT6989, MT6991, MT8186, MT8188, MT8196, MT8367, MT8391, MT8676, MT8678, MT8696, MT8766, MT8768, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, and MT8893. These chipsets are integrated into many Android devices running versions 14.0 through 16.0. The vulnerability arises from a missing bounds check in the battery management component, which leads to an out-of-bounds write condition. This flaw can be exploited locally by an attacker who already has System-level privileges on the device, allowing them to escalate privileges further, potentially gaining full control over the device. The exploit does not require any user interaction, increasing the risk of automated or stealthy attacks. The CVSS v3.1 base score is 7.8, reflecting high severity with metrics AV:L (Local), AC:L (Low complexity), PR:L (Low privileges required), UI:N (No user interaction), and impacts rated high on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk if leveraged by malicious actors. The issue was reserved in November 2024 and published in January 2026, with patches identified by MediaTek under patch ID ALPS10315812. The vulnerability's presence in battery subsystem code is critical because battery management is a core system function, and corruption here can destabilize the device or allow persistent malicious control.

Potential Impact

For European organizations, this vulnerability presents a significant risk primarily to mobile device security, especially for enterprises relying on Android devices with MediaTek chipsets for communication, authentication, or sensitive operations. Successful exploitation could lead to local privilege escalation, enabling attackers to bypass security controls, access confidential data, manipulate device integrity, or disrupt availability. This could impact sectors such as finance, healthcare, government, and critical infrastructure where mobile device security is paramount. The lack of user interaction requirement facilitates stealthy exploitation once System privileges are obtained, increasing the threat level. Additionally, the widespread use of MediaTek chipsets in mid-range and budget devices common in Europe means a broad attack surface. Organizations could face data breaches, espionage, or operational disruptions if attackers leverage this vulnerability in targeted campaigns or supply chain attacks. The absence of known exploits currently provides a window for proactive mitigation but also underscores the need for vigilance as exploit development could emerge rapidly.

Mitigation Recommendations

1. Apply official security patches from device manufacturers or MediaTek as soon as they become available to remediate the out-of-bounds write flaw. 2. Restrict and monitor System-level privileges on devices to minimize the risk of attackers gaining the prerequisite access for exploitation. 3. Employ mobile device management (MDM) solutions to enforce security policies, control app installations, and detect anomalous behavior related to battery subsystem or privilege escalation attempts. 4. Conduct regular security audits and penetration testing focusing on privilege escalation vectors on Android devices within the organization. 5. Educate users and administrators about the risks of rooting or jailbreaking devices, which can increase exposure to System-level exploits. 6. Implement network segmentation and endpoint detection to limit lateral movement if a device is compromised. 7. Monitor threat intelligence feeds for emerging exploit code or attack campaigns targeting this CVE to enable rapid response. 8. Collaborate with device vendors to ensure timely updates and verify patch deployment status across the device fleet.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3fb

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 1:53:39 AM

Last updated: 2/3/2026, 2:08:42 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats