Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20803: CWE-190 Integer Overflow in MediaTek, Inc. MT6899, MT6991, MT8793

0
Medium
VulnerabilityCVE-2025-20803cvecve-2025-20803cwe-190
Published: Tue Jan 06 2026 (01/06/2026, 01:47:10 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991, MT8793

Description

In dpe, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10199779; Issue ID: MSV-4504.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:17:23 UTC

Technical Analysis

CVE-2025-20803 is a security vulnerability classified under CWE-190 (Integer Overflow) affecting MediaTek's MT6899, MT6991, and MT8793 chipsets running Android 16.0. The vulnerability resides in the dpe component, where an integer overflow can lead to memory corruption. This memory corruption could be exploited to escalate privileges locally, but only if the attacker already possesses System privileges on the device. Additionally, user interaction is required to trigger the exploit, which limits remote exploitation potential. The integer overflow occurs when arithmetic operations exceed the maximum value storable in an integer variable, causing wraparound and potentially leading to buffer overflows or other memory safety issues. The vulnerability affects confidentiality, integrity, and availability by allowing an attacker to execute arbitrary code or manipulate system behavior at a high privilege level. The CVSS v3.1 base score is 6.7, reflecting a medium severity with attack vector local, low attack complexity, high privileges required, no user interaction, and impact on all three security properties. MediaTek has assigned patch ID ALPS10199779 to address the issue, though no public exploits have been reported to date. This vulnerability is relevant for devices using the specified MediaTek chipsets with Android 16.0, which are commonly found in various smartphones and embedded systems.

Potential Impact

The primary impact of CVE-2025-20803 is local privilege escalation, allowing an attacker with System-level access to gain higher privileges, potentially full root control. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, and disruption of device functionality. Since the vulnerability affects confidentiality, integrity, and availability, it poses a significant risk to device security and user privacy. Organizations deploying devices with these MediaTek chipsets may face increased risk of targeted attacks, especially in environments where devices are shared or physically accessible. The requirement for user interaction and existing System privileges reduces the likelihood of widespread exploitation but does not eliminate risk in high-value or sensitive environments. Failure to patch could enable attackers to bypass security controls, install persistent malware, or conduct espionage on affected devices.

Mitigation Recommendations

To mitigate CVE-2025-20803, organizations and device manufacturers should promptly apply the patch ALPS10199779 provided by MediaTek. Device users should update their Android 16.0 devices to the latest firmware versions incorporating this fix. Since exploitation requires System privileges and user interaction, enforcing strict access controls and limiting user permissions can reduce risk. Employing endpoint protection solutions that monitor for privilege escalation attempts and suspicious memory corruption behaviors is advisable. Additionally, educating users about the risks of interacting with untrusted applications or content can help prevent triggering the vulnerability. For organizations managing fleets of devices, implementing mobile device management (MDM) solutions to enforce timely updates and monitor device integrity is recommended. Regular security audits and vulnerability assessments focusing on embedded chipsets can help identify and remediate similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.407Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd40a

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 2/27/2026, 7:17:23 AM

Last updated: 3/25/2026, 9:30:58 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses