Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20799: CWE-416 Use After Free in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2025-20799cvecve-2025-20799cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:46:45 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In c2ps, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10274607; Issue ID: MSV-5049.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:25:44 UTC

Technical Analysis

CVE-2025-20799 is a use-after-free vulnerability classified under CWE-416 that affects several MediaTek chipset models (MT6899, MT6991, MT6993, MT8793). The vulnerability resides in the c2ps component, where improper memory management leads to use-after-free conditions causing memory corruption. This flaw can be exploited by an attacker who already possesses System-level privileges on the device to escalate privileges further, potentially gaining higher-level control or causing system instability. The vulnerability does not require any user interaction, making it easier to exploit once initial access is obtained. The CVSS v3.1 base score is 7.8, reflecting high severity due to its impact on confidentiality, integrity, and availability, combined with low attack complexity and limited privileges required. Although no public exploits have been reported yet, the presence of a patch (ALPS10274607) indicates vendor acknowledgment and remediation availability. The affected chipsets are widely used in mobile devices and IoT products, making this a significant concern for device manufacturers and end-users relying on MediaTek hardware. The flaw's exploitation could lead to unauthorized access to sensitive data, system compromise, or denial of service conditions.

Potential Impact

The vulnerability allows local attackers with System privileges to escalate their privileges further, potentially gaining full control over the affected device. This can lead to unauthorized access to sensitive data, manipulation or corruption of system processes, and disruption of device functionality. Given the widespread use of MediaTek chipsets in smartphones, tablets, and IoT devices globally, exploitation could affect millions of devices, leading to large-scale security breaches or service disruptions. The impact extends to both consumer and enterprise environments, particularly where devices handle sensitive information or critical operations. Additionally, compromised devices could be leveraged as entry points for lateral movement within corporate networks, increasing the overall risk posture. The absence of required user interaction lowers the barrier for exploitation once initial access is obtained, increasing the threat's seriousness.

Mitigation Recommendations

Organizations and device manufacturers should immediately apply the patch identified as ALPS10274607 to affected MediaTek chipsets. For devices where patching is not immediately feasible, implementing strict access controls to limit System-level privileges can reduce exploitation risk. Employ runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Control Flow Integrity (CFI) where supported to mitigate exploitation attempts. Regularly audit and monitor devices for unusual privilege escalations or memory corruption indicators. Device manufacturers should incorporate secure coding practices and conduct thorough memory safety testing in future chipset firmware releases. End-users should keep their device firmware and operating systems updated and avoid granting unnecessary elevated privileges to applications. Network segmentation and endpoint detection can help contain potential compromises stemming from exploited devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.403Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd3fe

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 3/30/2026, 7:25:44 PM

Last updated: 5/10/2026, 3:24:36 PM

Views: 143

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses