Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20799: CWE-416 Use After Free in MediaTek, Inc. MT6899, MT6991, MT6993, MT8793

0
High
VulnerabilityCVE-2025-20799cvecve-2025-20799cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:46:45 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991, MT6993, MT8793

Description

In c2ps, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10274607; Issue ID: MSV-5049.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:25:02 UTC

Technical Analysis

CVE-2025-20799 is a use-after-free vulnerability classified under CWE-416 found in the c2ps component of MediaTek chipsets MT6899, MT6991, MT6993, and MT8793, which are integrated into devices running Android versions 15.0 and 16.0. The vulnerability arises from improper memory management where a previously freed memory region is accessed, leading to memory corruption. This flaw can be exploited locally by an attacker who has already obtained System privileges on the device to escalate their privileges further, potentially gaining higher-level control or executing arbitrary code with elevated rights. Notably, exploitation does not require any user interaction, increasing the risk of automated or stealthy attacks. Although no public exploits have been reported so far, the vulnerability is significant because it can be leveraged in post-compromise scenarios to deepen an attacker’s foothold. The issue was identified and assigned by MediaTek, with a patch referenced as ALPS10274607, though no direct patch links are currently provided. The vulnerability affects a wide range of devices using these chipsets, which are prevalent in many Android smartphones globally. The absence of a CVSS score necessitates an independent severity assessment based on the impact and exploitability factors.

Potential Impact

For European organizations, the primary impact of CVE-2025-20799 lies in the potential for attackers who have already compromised a device at the System privilege level to escalate their privileges further, potentially gaining full control over the device. This could lead to unauthorized access to sensitive corporate data, interception of communications, installation of persistent malware, or disruption of device functionality. Given the widespread use of MediaTek chipsets in consumer and enterprise mobile devices, organizations relying on Android smartphones for communication, authentication, or mobile workforce operations could face increased risk. The vulnerability could also be exploited in targeted attacks against high-value individuals or sectors, such as government, finance, or critical infrastructure, where device compromise can have broader security implications. The lack of user interaction requirement means that once initial access is gained, attackers can exploit this vulnerability without alerting the user, complicating detection and response efforts.

Mitigation Recommendations

Organizations should prioritize patching affected devices as soon as MediaTek or device manufacturers release updates addressing CVE-2025-20799. Until patches are available, limiting System-level access to trusted applications and enforcing strict privilege management policies can reduce exploitation risk. Employ mobile device management (MDM) solutions to monitor device integrity and restrict installation of untrusted apps. Regularly audit devices for signs of compromise, especially those with System privileges. Educate users and administrators about the risks of privilege escalation vulnerabilities and encourage prompt reporting of unusual device behavior. For high-security environments, consider deploying endpoint detection and response (EDR) tools capable of detecting suspicious memory corruption or privilege escalation attempts. Additionally, collaborate with vendors to obtain timely security updates and verify patch deployment status across the device fleet.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3fe

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:25:02 AM

Last updated: 1/8/2026, 10:18:29 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats