Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20411: CWE-416 Use After Free in MediaTek, Inc. MT6878, MT6879, MT6881, MT6886, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8168, MT8188, MT8195, MT8365, MT8370, MT8390, MT8395, MT8666, MT8667, MT8673, MT8676, MT8793

0
High
VulnerabilityCVE-2026-20411cvecve-2026-20411cwe-416
Published: Mon Feb 02 2026 (02/02/2026, 08:15:03 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6878, MT6879, MT6881, MT6886, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8168, MT8188, MT8195, MT8365, MT8370, MT8390, MT8395, MT8666, MT8667, MT8673, MT8676, MT8793

Description

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:47:09 UTC

Technical Analysis

CVE-2026-20411 is a use-after-free vulnerability categorized under CWE-416, affecting the cameraisp component in a wide range of MediaTek System on Chips (SoCs) including MT6878 through MT8793 series. These SoCs are integrated into numerous Android devices running versions 13.0 through 16.0. The vulnerability arises from improper handling of memory where a freed object is accessed, leading to undefined behavior such as memory corruption. This flaw can be exploited by an attacker who has already gained System-level privileges on the device to escalate their privileges further or cause a local denial of service by destabilizing the cameraisp process or related subsystems. Notably, exploitation does not require any user interaction, which increases the risk in environments where an attacker has partial control. Although no public exploits are currently known, the broad range of affected chipsets and Android versions means many devices are potentially vulnerable. The vulnerability was reserved in November 2025 and published in February 2026, but no patch links are currently available, indicating that mitigation may rely on forthcoming vendor updates. The issue is significant because the cameraisp is a critical component handling camera image processing, and its compromise can affect device stability and security. The vulnerability’s impact is primarily local, requiring prior system-level access, but it can be leveraged to deepen compromise or disrupt device functionality.

Potential Impact

For European organizations, the impact of CVE-2026-20411 includes potential local denial of service on devices using affected MediaTek chipsets, which could disrupt mobile operations, especially for employees relying on smartphones for communication and business applications. The escalation of privilege risk means that attackers who have already compromised a device at the System level can gain further control, potentially bypassing security controls and accessing sensitive data or functionalities. This is particularly concerning for sectors with high mobile device usage and sensitive information, such as finance, healthcare, and government. The lack of user interaction requirement facilitates exploitation in compromised environments, increasing the threat level. The broad range of affected Android versions and chipsets suggests a large attack surface, especially in countries with high MediaTek device market share. Disruptions could affect mobile workforce productivity and increase the risk of data breaches or espionage if attackers leverage this vulnerability as part of multi-stage attacks. The absence of known exploits currently provides a window for proactive mitigation, but organizations should prioritize patch management and device security monitoring.

Mitigation Recommendations

1. Monitor MediaTek and device vendor advisories closely and apply security patches promptly once available to remediate the use-after-free flaw. 2. Enforce strict privilege separation on devices to limit the ability of attackers to gain or escalate System-level privileges. 3. Employ mobile device management (MDM) solutions to ensure devices are updated and to detect anomalous behavior indicative of exploitation attempts. 4. Restrict installation of untrusted applications and enforce application whitelisting to reduce the risk of initial compromise leading to System-level access. 5. Utilize runtime protections such as memory corruption mitigations (e.g., ASLR, DEP) where supported by the device to hinder exploitation of use-after-free vulnerabilities. 6. Educate users and administrators about the risks of privilege escalation vulnerabilities and encourage reporting of unusual device behavior. 7. For critical environments, consider network segmentation and limiting device access to sensitive resources until patches are applied. 8. Conduct regular security assessments and penetration testing focused on mobile device security to identify potential exploitation paths involving this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.008Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fbf

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 2/2/2026, 8:47:09 AM

Last updated: 2/7/2026, 8:05:00 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats