Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20412: CWE-787 Out-of-bounds Write in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2026-20412cvecve-2026-20412cwe-787
Published: Mon Feb 02 2026 (02/02/2026, 08:15:05 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In cameraisp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5733.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:34:06 UTC

Technical Analysis

CVE-2026-20412 is an out-of-bounds write vulnerability classified under CWE-787, found in the cameraisp component of MediaTek chipsets. The root cause is a missing bounds check that allows writing outside the intended memory buffer. This flaw can be exploited by a local attacker who already possesses System-level privileges on the device, enabling them to escalate privileges further, potentially gaining kernel-level or unrestricted access. The vulnerability does not require user interaction, increasing its risk in compromised environments. Affected chipsets include a broad range of MediaTek models (e.g., MT6878, MT6895, MT6983, MT8666, MT8793), which are widely deployed in smartphones, tablets, and IoT devices. The CVSS v3.1 score of 7.8 indicates high severity, with high impact on confidentiality, integrity, and availability, and low attack complexity given the prerequisite of System privileges. No public exploits have been reported yet, but the vulnerability's presence in a critical hardware component used globally makes it a significant security concern. The issue was reserved in November 2025 and published in February 2026. The lack of a patch link suggests that fixes may be pending or distributed through vendor-specific updates (e.g., ALPS10351676).

Potential Impact

The vulnerability allows an attacker with existing System privileges to perform out-of-bounds writes, which can corrupt memory and lead to arbitrary code execution or kernel-level privilege escalation. This can result in full device compromise, including unauthorized access to sensitive data, persistent malware installation, and disruption of device functionality. Since the flaw exists in the cameraisp component, which is integral to image processing on many devices, exploitation could also affect multimedia processing and related security features. The broad range of affected chipsets means millions of consumer and enterprise devices worldwide could be impacted. The absence of required user interaction facilitates stealthy exploitation in environments where an attacker has already gained partial control. This elevates the risk in scenarios such as compromised apps, insider threats, or malware that has achieved System privileges. The overall impact includes potential breaches of confidentiality, integrity, and availability, undermining trust in affected devices and possibly leading to significant operational and reputational damage for organizations relying on MediaTek-based hardware.

Mitigation Recommendations

Organizations and device manufacturers should prioritize obtaining and applying official patches from MediaTek or device vendors as soon as they become available. Until patches are deployed, it is critical to restrict local System privilege access to trusted users and processes only, minimizing the attack surface. Employing runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) can help mitigate exploitation attempts. Regularly auditing and monitoring devices for unusual behavior indicative of privilege escalation attempts is recommended. For developers, reviewing and improving input validation and bounds checking in embedded system components is essential to prevent similar vulnerabilities. Network segmentation and limiting physical or remote access to devices can reduce the risk of attackers reaching the required privilege level. Additionally, organizations should maintain up-to-date inventories of devices using affected MediaTek chipsets to ensure timely response and patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.008Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fc2

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 3/30/2026, 7:34:06 PM

Last updated: 5/8/2026, 9:12:59 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses