Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20801: CWE-415 Double Free in MediaTek, Inc. MT6878, MT6897, MT6899, MT6985, MT6989, MT6991, MT6993, MT8792, MT8796, MT8798

0
High
VulnerabilityCVE-2025-20801cvecve-2025-20801cwe-415
Published: Tue Jan 06 2026 (01/06/2026, 01:46:49 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6878, MT6897, MT6899, MT6985, MT6989, MT6991, MT6993, MT8792, MT8796, MT8798

Description

In seninf, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10251210; Issue ID: MSV-4926.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:24:29 UTC

Technical Analysis

CVE-2025-20801 is a security vulnerability identified in the seninf (sensor interface) component of MediaTek's system-on-chip (SoC) platforms, including MT6878, MT6897, MT6899, MT6985, MT6989, MT6991, MT6993, MT8792, MT8796, and MT8798. These SoCs are integrated into a wide range of Android devices running versions 13.0 through 16.0. The vulnerability is classified as a double free (CWE-415), which occurs when the same memory location is freed more than once, leading to memory corruption. This specific flaw stems from a race condition within the seninf driver, which can be exploited by an attacker who already possesses System-level privileges on the device. Exploiting this race condition can cause memory corruption that may allow the attacker to escalate privileges locally, potentially gaining higher-level control or bypassing security mechanisms. Notably, exploitation does not require any user interaction, increasing the risk in multi-user or shared device scenarios. Although no public exploits have been reported, the vulnerability is significant due to the widespread deployment of affected MediaTek SoCs in consumer and enterprise Android devices. The vendor has acknowledged the issue (Issue ID: MSV-4926) and assigned a patch ID (ALPS10251210), but no patch links are currently available. The absence of a CVSS score necessitates an independent severity assessment based on the vulnerability's characteristics.

Potential Impact

For European organizations, the primary impact of CVE-2025-20801 lies in the potential for local privilege escalation on devices using affected MediaTek chipsets. This could enable attackers who have already compromised a device at the System level to gain further control, potentially accessing sensitive data, installing persistent malware, or bypassing security controls. The vulnerability does not allow remote exploitation directly but can be leveraged in multi-stage attacks where initial access is obtained through other means. Given the prevalence of MediaTek SoCs in smartphones, tablets, and IoT devices used by employees and within enterprise environments, this vulnerability could facilitate lateral movement or persistence within corporate networks. The lack of user interaction requirement increases risk in environments with shared devices or where multiple users have some level of system access. Additionally, the memory corruption could lead to device instability or denial of service, impacting availability. The overall risk is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and government, where device compromise can have severe regulatory and operational consequences.

Mitigation Recommendations

1. Monitor MediaTek and device vendor advisories closely and apply security patches promptly once released to address this vulnerability. 2. Implement strict access control policies to limit System-level privileges on devices, reducing the pool of users who could exploit this flaw. 3. Employ mobile device management (MDM) solutions to enforce security configurations, restrict installation of unauthorized applications, and monitor device integrity. 4. Conduct regular security audits and vulnerability assessments on devices within the corporate environment to detect signs of exploitation or privilege escalation. 5. Educate users about the risks of granting elevated privileges and encourage best practices for device security. 6. Where feasible, isolate critical enterprise applications and data from devices running affected MediaTek chipsets or consider alternative hardware platforms until patches are applied. 7. Utilize runtime protection and endpoint detection tools capable of identifying abnormal memory corruption or privilege escalation behaviors. 8. Maintain up-to-date backups and incident response plans to mitigate potential impacts of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.406Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd404

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:24:29 AM

Last updated: 1/8/2026, 10:18:28 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats