Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20804: CWE-416 Use After Free in MediaTek, Inc. MT6899, MT6991

0
Medium
VulnerabilityCVE-2025-20804cvecve-2025-20804cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:12 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991

Description

CVE-2025-20804 is a use-after-free vulnerability in MediaTek MT6899 and MT6991 chipsets affecting Android 16. 0 devices. It occurs in the dpe component and can cause memory corruption leading to local privilege escalation, but only if the attacker already has System-level privileges. Exploitation requires user interaction, and no known exploits are currently in the wild. The CVSS score is 6. 7 (medium severity) reflecting high impact on confidentiality, integrity, and availability but limited by the need for high privileges and user interaction. This vulnerability primarily affects devices using these MediaTek chipsets, which are common in certain smartphone models. European organizations using affected devices could face risks if attackers gain initial system access. Mitigation involves applying vendor patches promptly and restricting user interaction with untrusted content. Countries with high smartphone penetration and significant use of MediaTek-based devices, such as Germany, France, Italy, Spain, and the UK, are most likely to be impacted.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:54:46 UTC

Technical Analysis

CVE-2025-20804 is a use-after-free vulnerability classified under CWE-416 found in the dpe component of MediaTek chipsets MT6899 and MT6991, which are integrated into devices running Android 16.0. The vulnerability arises from improper memory management where a previously freed memory region is accessed, leading to memory corruption. This flaw can be exploited to escalate privileges locally, but only if the attacker already possesses System-level privileges on the device. User interaction is required to trigger the vulnerability, which limits remote exploitation potential. The vulnerability can compromise confidentiality, integrity, and availability of the affected system by enabling an attacker to execute arbitrary code or manipulate system behavior. The CVSS v3.1 score of 6.7 reflects a medium severity, with attack vector local, low attack complexity, high privileges required, no user interaction, and impacts rated high across confidentiality, integrity, and availability. No public exploits have been reported yet, but the existence of a patch (ALPS10198951) indicates vendor acknowledgment and remediation efforts. The vulnerability is relevant to devices using these MediaTek chipsets, which are prevalent in various smartphone models, especially in markets where MediaTek is a dominant supplier. Given the technical nature, exploitation requires a sophisticated attacker with existing system privileges and the ability to induce user interaction, such as through social engineering or malicious apps.

Potential Impact

For European organizations, the primary impact of CVE-2025-20804 lies in the potential for local privilege escalation on devices using affected MediaTek chipsets. This could allow attackers who have already compromised a device at the System level to gain even greater control, potentially leading to unauthorized access to sensitive data, disruption of device functionality, or persistence of malicious code. The requirement for user interaction and existing high privileges reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments where devices are used for sensitive communications or data processing. Enterprises relying on Android 16.0 devices with these chipsets may face increased risk of insider threats or targeted attacks leveraging this vulnerability. The impact on confidentiality, integrity, and availability is high if exploited, potentially affecting mobile device management, secure communications, and access control within organizations. Additionally, compromised devices could serve as footholds for lateral movement or further attacks within corporate networks.

Mitigation Recommendations

To mitigate CVE-2025-20804, European organizations should prioritize deploying the official patch ALPS10198951 provided by MediaTek or device manufacturers as soon as it becomes available. Until patches are applied, organizations should enforce strict access controls to limit System-level privileges on devices and monitor for unusual privilege escalations or suspicious user interactions. Implementing mobile device management (MDM) solutions can help enforce security policies, restrict installation of untrusted applications, and control user permissions. User awareness training is critical to reduce the risk of social engineering attacks that could trigger the vulnerability. Additionally, organizations should audit and restrict the use of devices running Android 16.0 with affected chipsets in sensitive environments. Network segmentation and endpoint detection and response (EDR) tools can help detect and contain potential exploitation attempts. Regular vulnerability scanning and threat intelligence monitoring should be maintained to stay informed about any emerging exploits or attack campaigns targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.407Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd40d

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 1/14/2026, 1:54:46 AM

Last updated: 2/6/2026, 8:44:24 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats