CVE-2026-20410: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6897, MT6989, MT8370, MT8390, MT8395
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10362552; Issue ID: MSV-5760.
AI Analysis
Technical Summary
CVE-2026-20410 is a security vulnerability identified in MediaTek's imgsys component affecting several of its chipsets: MT6897, MT6989, MT8370, MT8390, and MT8395, specifically on devices running Android 15.0. The vulnerability is classified as CWE-787, an out-of-bounds write, caused by a missing bounds check in the imgsys module. This flaw allows a local attacker who already possesses System-level privileges to perform an out-of-bounds write, potentially leading to escalation of privileges beyond their current level. The vulnerability does not require user interaction for exploitation, but it does require the attacker to have System privileges beforehand, which limits the initial attack vector. The impact of this vulnerability includes potential compromise of confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score is 6.7, indicating a medium severity, with the vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, meaning local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vendor has assigned a patch ID ALPS10362552 and issue ID MSV-5760, indicating that a fix is planned or available. The vulnerability was reserved in November 2025 and published in February 2026. Given the affected chipsets are widely used in various Android devices, this vulnerability poses a risk to a broad user base once devices upgrade to Android 15.0 or later. The imgsys component is typically involved in image processing subsystems, and a flaw here could allow attackers to manipulate system behavior or escalate privileges to compromise device security further.
Potential Impact
The vulnerability allows an attacker with existing System privileges to perform an out-of-bounds write, which can lead to local privilege escalation. This can compromise the confidentiality, integrity, and availability of the device by enabling unauthorized code execution or system modification. Although initial exploitation requires high privileges, successful exploitation could allow attackers to gain root or kernel-level control, potentially bypassing security controls and gaining persistent access. This could lead to data theft, device manipulation, or denial of service. The impact is significant for organizations relying on affected MediaTek chipsets in Android 15 devices, especially in environments where multiple users or apps have System-level access. The lack of user interaction requirement increases the risk of automated or stealthy exploitation once the attacker has System privileges. However, since no known exploits are currently in the wild, the immediate risk is moderate but could increase as exploit techniques develop.
Mitigation Recommendations
Organizations and device manufacturers should prioritize applying the official patch identified by ALPS10362552 as soon as it becomes available to remediate the vulnerability. Until patches are deployed, restrict System-level access to trusted applications and users only, minimizing the attack surface. Employ runtime protections such as memory safety enforcement, sandboxing, and integrity checks to detect and prevent out-of-bounds writes. Conduct thorough audits of apps and services with System privileges to ensure they are not compromised or malicious. Monitor devices for unusual behavior indicative of privilege escalation attempts. For enterprises managing fleets of devices, implement mobile device management (MDM) policies that enforce timely updates and restrict installation of untrusted software. Additionally, consider isolating critical workloads from devices using affected chipsets until patches are applied. Security teams should stay informed about updates from MediaTek and Android security bulletins regarding this vulnerability.
Affected Countries
China, India, Indonesia, Vietnam, Philippines, Thailand, Malaysia, Taiwan, South Korea, Brazil, Russia, United States
CVE-2026-20410: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6897, MT6989, MT8370, MT8390, MT8395
Description
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10362552; Issue ID: MSV-5760.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20410 is a security vulnerability identified in MediaTek's imgsys component affecting several of its chipsets: MT6897, MT6989, MT8370, MT8390, and MT8395, specifically on devices running Android 15.0. The vulnerability is classified as CWE-787, an out-of-bounds write, caused by a missing bounds check in the imgsys module. This flaw allows a local attacker who already possesses System-level privileges to perform an out-of-bounds write, potentially leading to escalation of privileges beyond their current level. The vulnerability does not require user interaction for exploitation, but it does require the attacker to have System privileges beforehand, which limits the initial attack vector. The impact of this vulnerability includes potential compromise of confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score is 6.7, indicating a medium severity, with the vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, meaning local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vendor has assigned a patch ID ALPS10362552 and issue ID MSV-5760, indicating that a fix is planned or available. The vulnerability was reserved in November 2025 and published in February 2026. Given the affected chipsets are widely used in various Android devices, this vulnerability poses a risk to a broad user base once devices upgrade to Android 15.0 or later. The imgsys component is typically involved in image processing subsystems, and a flaw here could allow attackers to manipulate system behavior or escalate privileges to compromise device security further.
Potential Impact
The vulnerability allows an attacker with existing System privileges to perform an out-of-bounds write, which can lead to local privilege escalation. This can compromise the confidentiality, integrity, and availability of the device by enabling unauthorized code execution or system modification. Although initial exploitation requires high privileges, successful exploitation could allow attackers to gain root or kernel-level control, potentially bypassing security controls and gaining persistent access. This could lead to data theft, device manipulation, or denial of service. The impact is significant for organizations relying on affected MediaTek chipsets in Android 15 devices, especially in environments where multiple users or apps have System-level access. The lack of user interaction requirement increases the risk of automated or stealthy exploitation once the attacker has System privileges. However, since no known exploits are currently in the wild, the immediate risk is moderate but could increase as exploit techniques develop.
Mitigation Recommendations
Organizations and device manufacturers should prioritize applying the official patch identified by ALPS10362552 as soon as it becomes available to remediate the vulnerability. Until patches are deployed, restrict System-level access to trusted applications and users only, minimizing the attack surface. Employ runtime protections such as memory safety enforcement, sandboxing, and integrity checks to detect and prevent out-of-bounds writes. Conduct thorough audits of apps and services with System privileges to ensure they are not compromised or malicious. Monitor devices for unusual behavior indicative of privilege escalation attempts. For enterprises managing fleets of devices, implement mobile device management (MDM) policies that enforce timely updates and restrict installation of untrusted software. Additionally, consider isolating critical workloads from devices using affected chipsets until patches are applied. Security teams should stay informed about updates from MediaTek and Android security bulletins regarding this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.008Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f82
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/27/2026, 7:52:10 AM
Last updated: 3/24/2026, 11:26:35 AM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.