Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20411: CWE-416 Use After Free in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2026-20411cvecve-2026-20411cwe-416
Published: Mon Feb 02 2026 (02/02/2026, 08:15:03 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:33:36 UTC

Technical Analysis

CVE-2026-20411 is a use-after-free vulnerability classified under CWE-416 found in the cameraisp component of MediaTek chipsets. The issue arises when memory is freed but subsequently accessed, leading to undefined behavior that can be exploited to escalate privileges locally or cause a denial of service. The vulnerability affects numerous MediaTek chipset models, including MT6878, MT6886, MT6895, MT6983, MT8168, MT8195, MT8395, and others, which are widely used in smartphones, tablets, and IoT devices. Exploitation does not require user interaction but does require the attacker to have already obtained System-level privileges, indicating that this vulnerability is a post-compromise escalation vector rather than an initial entry point. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full confidentiality, integrity, and availability impact (C:H/I:H/A:H). While no public exploits are known at this time, the vulnerability could be leveraged by advanced threat actors to maintain persistence or disrupt device functionality. The vulnerability was reserved in November 2025 and published in February 2026. No patch links are currently provided, but MediaTek has assigned a patch ID (ALPS10351676) and issue ID (MSV-5737), indicating that fixes are likely forthcoming. The vulnerability's scope is local, requiring low attack complexity and no user interaction, but the prerequisite of system privileges limits its exploitation to scenarios where the attacker already controls the device at a high level.

Potential Impact

The impact of CVE-2026-20411 is significant for organizations relying on MediaTek-based devices, especially in mobile and embedded environments. An attacker with system-level access can exploit this vulnerability to escalate privileges further or cause local denial of service, potentially disrupting critical device functions such as camera operations. This can lead to loss of confidentiality if sensitive data processed by the cameraisp is exposed, integrity violations through unauthorized code execution or memory corruption, and availability issues due to device crashes or reboots. For enterprises deploying MediaTek-powered devices in sensitive environments, this vulnerability could facilitate lateral movement, persistence, or sabotage by malicious insiders or advanced persistent threats. Although exploitation requires prior system privileges, the vulnerability increases the attack surface post-compromise, complicating incident response and remediation efforts. The broad range of affected chipset models means a large installed base is at risk, amplifying the potential scale of impact globally.

Mitigation Recommendations

To mitigate CVE-2026-20411 effectively, organizations should prioritize the following actions: 1) Monitor MediaTek and device vendor advisories closely and apply patches or firmware updates as soon as they become available to address the use-after-free flaw. 2) Restrict and monitor access to system-level privileges rigorously to prevent attackers from obtaining the necessary conditions for exploitation. 3) Employ runtime protections such as memory corruption mitigations (e.g., heap protections, use-after-free detection) where supported by the device OS or firmware. 4) Implement strict application whitelisting and integrity checks on critical system components to detect unauthorized modifications. 5) Conduct regular security audits and penetration testing focusing on privilege escalation vectors within devices using affected MediaTek chipsets. 6) For high-security environments, consider network segmentation and device isolation to limit the impact of compromised devices. 7) Educate users and administrators about the risks of privilege escalation vulnerabilities and the importance of timely updates. These measures, combined with vendor patches, will reduce the likelihood and impact of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.008Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fbf

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 3/30/2026, 7:33:36 PM

Last updated: 5/10/2026, 10:33:16 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses