Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20804: CWE-416 Use After Free in MediaTek, Inc. MT6899, MT6991

0
Medium
VulnerabilityCVE-2025-20804cvecve-2025-20804cwe-416
Published: Tue Jan 06 2026 (01/06/2026, 01:47:12 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6899, MT6991

Description

In dpe, there is a possible memory corruption due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is needed for exploitation. Patch ID: ALPS10198951; Issue ID: MSV-4503.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:17:34 UTC

Technical Analysis

CVE-2025-20804 is a use-after-free vulnerability classified under CWE-416 found in the dpe component of MediaTek's MT6899 and MT6991 chipsets, which are integrated into devices running Android 16.0. The flaw arises when the system attempts to access memory that has already been freed, causing memory corruption. This vulnerability requires the attacker to have already obtained System-level privileges on the device and also necessitates user interaction to trigger the exploit. The consequence of exploitation is a local escalation of privilege, potentially allowing an attacker to execute arbitrary code with elevated rights, manipulate sensitive data, or disrupt system operations. The CVSS v3.1 base score is 6.7, reflecting medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement for local access and user interaction. The vulnerability was publicly disclosed on January 6, 2026, with no known exploits in the wild at the time of publication. MediaTek has assigned patch ID ALPS10198951 to remediate this issue. The vulnerability affects devices using the MT6899 and MT6991 chipsets, which are commonly found in mid-to-high-end smartphones and tablets running Android 16.0.

Potential Impact

The primary impact of CVE-2025-20804 is local privilege escalation on affected devices, which can lead to full system compromise if exploited. An attacker with System privileges could leverage this vulnerability to gain higher privileges, potentially bypassing security controls and accessing or modifying sensitive information. This could result in unauthorized data disclosure, persistent malware installation, or denial of service through system instability. Since exploitation requires prior System-level access and user interaction, the risk is somewhat mitigated but remains significant in scenarios where attackers have already compromised the device or trick users into performing specific actions. Organizations deploying devices with these MediaTek chipsets, especially in sensitive environments, face increased risk of insider threats or targeted attacks aiming to elevate privileges and gain deeper control over devices.

Mitigation Recommendations

To mitigate CVE-2025-20804, organizations and users should promptly apply the patch identified by MediaTek as ALPS10198951 once available. Device manufacturers and carriers should expedite firmware updates for affected devices running Android 16.0. Additionally, enforcing strict access controls to prevent unauthorized users from obtaining System privileges reduces the attack surface. Employing endpoint protection solutions that monitor for unusual privilege escalation attempts can help detect exploitation attempts. User education to avoid interacting with suspicious prompts or applications is critical since user interaction is required for exploitation. For high-security environments, consider restricting installation of untrusted applications and implementing application whitelisting. Regularly auditing devices for privilege anomalies and ensuring secure configuration of Android devices further reduces risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.407Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e7a3839e44175bdd40d

Added to database: 1/6/2026, 2:07:54 AM

Last enriched: 2/27/2026, 7:17:34 AM

Last updated: 3/24/2026, 10:04:07 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses