Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20803: CWE-190 Integer Overflow in MediaTek, Inc. MT6899, MT6991, MT8793

0
Medium
VulnerabilityCVE-2025-20803cvecve-2025-20803cwe-190
Published: Tue Jan 06 2026 (01/06/2026, 01:47:10 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991, MT8793

Description

CVE-2025-20803 is an integer overflow vulnerability in MediaTek chipsets MT6899, MT6991, and MT8793 affecting Android 16. 0. The flaw exists in the dpe component and can cause memory corruption, potentially leading to local privilege escalation. Exploitation requires the attacker to already have System-level privileges and user interaction is necessary. The vulnerability has a CVSS score of 6. 7, indicating medium severity, with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Patching is advised once updates are available from MediaTek or device manufacturers. European organizations using devices with these chipsets should prioritize mitigation to prevent potential privilege escalation risks.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:54:26 UTC

Technical Analysis

CVE-2025-20803 is a medium severity integer overflow vulnerability identified in MediaTek's MT6899, MT6991, and MT8793 chipsets, specifically affecting devices running Android 16.0. The vulnerability resides in the dpe (likely a device processing engine or similar component) where an integer overflow can lead to memory corruption. This memory corruption can be exploited to escalate privileges locally, but only if the attacker has already obtained System-level privileges on the device. User interaction is required for exploitation, which may involve tricking a user into performing an action that triggers the overflow. The CVSS vector (AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) indicates that the attack requires local access with low complexity, high privileges, no user interaction, and impacts confidentiality, integrity, and availability significantly. Although no exploits have been reported in the wild, the vulnerability poses a risk of privilege escalation that could be leveraged in multi-stage attacks. The issue was reserved in November 2024 and published in January 2026, with MediaTek assigning it the identifier MSV-4504 and patch ID ALPS10199779, though no public patch links are currently available. This vulnerability is classified under CWE-190 (Integer Overflow or Wraparound), a common source of memory corruption bugs leading to security issues.

Potential Impact

For European organizations, the impact of CVE-2025-20803 can be significant in environments where devices with affected MediaTek chipsets are deployed, especially those running Android 16.0. The vulnerability allows local attackers who already have System privileges to escalate their privileges further, potentially gaining full control over the device. This could lead to unauthorized access to sensitive data, manipulation of device functions, or disruption of services. In corporate or governmental contexts, compromised devices could serve as footholds for lateral movement or data exfiltration. The requirement for user interaction and pre-existing high privileges limits the attack surface, but insider threats or compromised devices could still be exploited. The absence of known exploits reduces immediate risk, but the medium severity rating and high impact on confidentiality, integrity, and availability warrant proactive mitigation. Organizations relying on mobile devices with these chipsets for critical operations should assess their exposure and prepare for patch deployment.

Mitigation Recommendations

1. Monitor vendor and device manufacturer advisories closely for patches addressing CVE-2025-20803 and apply them promptly once available. 2. Limit System-level privileges on devices to trusted administrators and enforce strict access controls to reduce the risk of privilege escalation. 3. Implement endpoint protection solutions capable of detecting anomalous local privilege escalation attempts. 4. Educate users about the risks of interacting with untrusted applications or links that could trigger the vulnerability. 5. Employ mobile device management (MDM) tools to enforce security policies, restrict installation of unauthorized apps, and control user interactions. 6. Conduct regular security audits on devices with affected chipsets to identify any signs of compromise. 7. Where possible, isolate critical devices from less secure networks to reduce exposure to local attackers. 8. Consider deploying runtime application self-protection (RASP) or similar technologies that can detect and prevent exploitation attempts at the application or OS level.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.407Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd40a

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 1:54:26 AM

Last updated: 2/7/2026, 9:16:09 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats