Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20800: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6989, MT6991, MT8678, MT8793

0
High
VulnerabilityCVE-2025-20800cvecve-2025-20800cwe-787
Published: Tue Jan 06 2026 (01/06/2026, 01:46:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6899, MT6989, MT6991, MT8678, MT8793

Description

CVE-2025-20800 is a high-severity out-of-bounds write vulnerability in MediaTek chipsets MT2718, MT6899, MT6989, MT6991, MT8678, and MT8793 affecting Android versions 14. 0 to 16. 0. The flaw exists in the mminfra component due to a missing bounds check, allowing a local attacker with System privileges to escalate privileges further without user interaction. Exploitation requires prior System-level access, but once exploited, it can compromise confidentiality, integrity, and availability of the device. No known exploits are currently in the wild, and a patch has been identified but not linked. European organizations using devices with these MediaTek chipsets, especially in mobile or embedded systems, face risks of privilege escalation attacks. Mitigation involves applying vendor patches promptly and restricting System-level access to trusted processes only. Countries with high adoption of MediaTek-based Android devices, such as Germany, France, Italy, Spain, and the UK, are most likely affected. Given the high impact on core system security and ease of exploitation at the local level, the severity is rated high.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:54:15 UTC

Technical Analysis

CVE-2025-20800 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in several MediaTek chipsets (MT2718, MT6899, MT6989, MT6991, MT8678, MT8793) that power Android devices running versions 14.0 through 16.0. The vulnerability arises from a missing bounds check in the mminfra component, which is part of the MediaTek infrastructure likely responsible for memory management or multimedia processing. This flaw allows a local attacker who already has System privileges to perform an out-of-bounds write, potentially overwriting critical memory regions. Such memory corruption can lead to escalation of privileges beyond the System level, enabling the attacker to gain higher control over the device, compromise sensitive data, or disrupt system operations. Exploitation does not require user interaction, increasing the risk if an attacker gains initial System access, which might be obtained through other vulnerabilities or insider threats. The CVSS v3.1 score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required but limited to local access. No public exploits are currently known, but the vulnerability is serious enough to warrant immediate attention. A patch has been identified (ALPS10267349), though no direct patch links are provided. The vulnerability affects a broad range of MediaTek chipsets used in many Android devices, making it relevant for mobile device security and embedded systems relying on these chipsets.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those relying on mobile devices or embedded systems powered by affected MediaTek chipsets. Successful exploitation can lead to full system compromise, allowing attackers to bypass security controls, access sensitive corporate data, or disrupt critical services. The local nature of the attack means that threat actors with some level of access (e.g., through insider threats, compromised apps, or chained exploits) can escalate privileges to gain persistent and deeper control. This can impact confidentiality by exposing sensitive information, integrity by allowing unauthorized modifications, and availability by potentially causing system crashes or denial of service. Industries with high mobile device usage or IoT deployments, such as finance, healthcare, and manufacturing, are particularly vulnerable. The lack of user interaction requirement increases the risk of automated or stealthy attacks once initial access is gained. Without timely patching, organizations face increased exposure to advanced persistent threats and targeted attacks.

Mitigation Recommendations

1. Apply the official MediaTek patch ALPS10267349 as soon as it becomes available from device manufacturers or vendors to remediate the out-of-bounds write issue. 2. Restrict and monitor System-level privileges on devices to minimize the risk of initial compromise that could lead to privilege escalation. 3. Employ mobile device management (MDM) solutions to enforce security policies, control app installations, and detect anomalous behavior indicative of exploitation attempts. 4. Conduct regular security audits and vulnerability assessments on devices using affected chipsets to identify potential compromise early. 5. Educate users and administrators about the risks of privilege escalation and the importance of applying updates promptly. 6. Implement network segmentation and least privilege principles to limit lateral movement if a device is compromised. 7. Monitor security advisories from MediaTek and Android OEMs for updates or additional mitigations. 8. Consider deploying endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation activities on mobile and embedded devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.405Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd401

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 1:54:15 AM

Last updated: 2/7/2026, 10:26:21 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats