Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20803: CWE-190 Integer Overflow in MediaTek, Inc. MT6899, MT6991, MT8793

0
Medium
VulnerabilityCVE-2025-20803cvecve-2025-20803cwe-190
Published: Tue Jan 06 2026 (01/06/2026, 01:47:10 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991, MT8793

Description

In dpe, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10199779; Issue ID: MSV-4504.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:24:01 UTC

Technical Analysis

CVE-2025-20803 is a vulnerability identified in MediaTek's MT6899, MT6991, and MT8793 chipsets, specifically within the dpe component on devices running Android 16.0. The root cause is an integer overflow (CWE-190), which can lead to memory corruption. Integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing unexpected behavior such as buffer overflows or memory corruption. In this case, the overflow can corrupt memory structures, potentially allowing an attacker to escalate privileges locally. However, exploitation requires the attacker to already have System-level privileges, meaning they must have significant access beforehand. Additionally, user interaction is necessary, indicating that the attacker must trick a user into performing some action to trigger the vulnerability. Although no known exploits are currently reported in the wild, the presence of this flaw poses a risk for local privilege escalation attacks, which can undermine device security and integrity. The vendor has identified a patch (ALPS10199779), but no direct patch link is provided. This vulnerability affects devices using these MediaTek chipsets, which are common in many Android smartphones and tablets. The flaw's exploitation could allow malicious actors to gain elevated privileges, potentially leading to further compromise of the device and sensitive data.

Potential Impact

For European organizations, the impact of CVE-2025-20803 centers on the potential for local privilege escalation on devices using affected MediaTek chipsets. This could allow attackers who have already gained System-level access to further elevate their privileges, potentially bypassing security controls and gaining full control over the device. This undermines device integrity and confidentiality, possibly exposing sensitive corporate data stored or accessed on these devices. The requirement for user interaction and prior System privileges limits the attack surface but does not eliminate risk, especially in environments where devices are shared or users may be tricked into executing malicious actions. Organizations relying on Android devices with these chipsets for critical communications, authentication, or data access could face increased risk of targeted attacks or insider threats exploiting this vulnerability. The lack of known exploits in the wild currently reduces immediate risk, but the vulnerability should be addressed proactively to prevent future exploitation. Failure to patch could lead to compromised devices, data breaches, and disruption of business operations.

Mitigation Recommendations

1. Apply the vendor-provided patch ALPS10199779 as soon as it becomes available and validated for your device models. 2. Restrict user permissions and limit the ability to install or run untrusted applications that could trigger the vulnerability. 3. Implement strict device management policies to control user interaction with potentially malicious content, including disabling or restricting features that could be exploited to invoke the vulnerability. 4. Monitor devices for unusual behavior indicative of privilege escalation attempts, such as unexpected system-level process activity or memory corruption symptoms. 5. Educate users about the risks of interacting with untrusted applications or links, emphasizing the need for caution to prevent triggering vulnerabilities requiring user interaction. 6. Employ endpoint detection and response (EDR) tools capable of detecting local privilege escalation attempts on Android devices. 7. Maintain an inventory of devices using the affected MediaTek chipsets to prioritize patching and monitoring efforts. 8. Collaborate with device vendors and security teams to ensure timely updates and vulnerability management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.407Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd40a

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/6/2026, 2:24:01 AM

Last updated: 1/8/2026, 2:27:35 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats