Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20414: CWE-416 Use After Free in MediaTek, Inc. MT6897, MT6989, MT8196, MT8678, MT8766, MT8768, MT8786, MT8796

0
Medium
VulnerabilityCVE-2026-20414cvecve-2026-20414cwe-416
Published: Mon Feb 02 2026 (02/02/2026, 08:15:09 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6897, MT6989, MT8196, MT8678, MT8766, MT8768, MT8786, MT8796

Description

In imgsys, there is a possible escalation of privilege due to use after free. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10362999; Issue ID: MSV-5625.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:53:21 UTC

Technical Analysis

CVE-2026-20414 is a use-after-free vulnerability classified under CWE-416 affecting the imgsys component in multiple MediaTek System on Chips (SoCs): MT6897, MT6989, MT8196, MT8678, MT8766, MT8768, MT8786, and MT8796. These SoCs are integrated into devices running Android 15.0. The vulnerability stems from improper handling of memory where a freed object is accessed again, potentially leading to escalation of privilege. Specifically, a malicious actor who has already obtained System-level privileges can exploit this flaw to further elevate privileges, potentially gaining more control over the device. The attack vector is local, requiring no user interaction, but does require the attacker to have high privileges initially. The CVSS v3.1 score of 6.7 reflects a medium severity, with high impact on confidentiality, integrity, and availability if exploited. The vulnerability was reserved in November 2025 and published in February 2026. There are no known exploits in the wild at this time, and no patch links have been provided yet, though MediaTek has assigned a patch ID (ALPS10362999) and issue ID (MSV-5625). This vulnerability is particularly critical for environments where devices with these MediaTek SoCs are used in sensitive or high-security contexts, as it could allow attackers to bypass existing privilege boundaries.

Potential Impact

The primary impact of CVE-2026-20414 is the potential for local privilege escalation on devices using affected MediaTek SoCs running Android 15.0. If exploited, an attacker with System privileges could gain even higher privileges, potentially leading to full device compromise. This could allow unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, or disruption of device availability. Although initial exploitation requires System-level access, the vulnerability could be chained with other exploits to achieve full control. This poses a significant risk to organizations relying on affected devices for secure communications, data storage, or operational technology. The absence of user interaction lowers the barrier for exploitation once initial access is obtained. The lack of known exploits currently reduces immediate risk but underscores the need for proactive mitigation. The vulnerability could affect mobile device manufacturers, telecom operators, and enterprises deploying MediaTek-based Android 15 devices, especially in sectors like government, finance, and critical infrastructure.

Mitigation Recommendations

Organizations should implement a multi-layered mitigation strategy. First, monitor vendor advisories closely and apply official patches from MediaTek or device manufacturers as soon as they become available, referencing patch ID ALPS10362999. Until patches are deployed, restrict local access to devices, enforce strict privilege separation, and minimize the number of users or processes with System-level privileges. Employ runtime protection mechanisms such as memory protection and exploit mitigation technologies (e.g., Control Flow Integrity, Address Space Layout Randomization) where supported. Conduct regular audits of device security configurations and monitor for unusual privilege escalations or system behavior. For enterprise deployments, consider mobile device management (MDM) solutions to enforce security policies and remotely update devices. Additionally, educate users and administrators about the risk of privilege escalation and the importance of limiting local access. Finally, maintain an incident response plan tailored to mobile device compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.009Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fc8

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 2/27/2026, 7:53:21 AM

Last updated: 3/24/2026, 12:27:33 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses