Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20423: CWE-749 Exposed Dangerous Method or Function in MediaTek, Inc. MediaTek chipset

0
High
VulnerabilityCVE-2026-20423cvecve-2026-20423cwe-749
Published: Mon Mar 02 2026 (03/02/2026, 08:37:41 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:38:05 UTC

Technical Analysis

CVE-2026-20423 is a vulnerability classified under CWE-749 (Exposed Dangerous Method or Function) found in the WLAN STA driver of MediaTek chipsets, specifically models MT7902, MT7920, MT7921, MT7922, MT7925, and MT7927. The flaw arises from a missing bounds check in the driver code, leading to a possible out-of-bounds write condition. This memory corruption can be exploited by a local attacker who already has user-level execution privileges on the device, allowing them to escalate privileges to higher levels, potentially root or kernel privileges. Notably, exploitation does not require any user interaction, increasing the risk of automated or stealthy attacks. The vulnerability impacts confidentiality, integrity, and availability, as an attacker could execute arbitrary code, manipulate sensitive data, or disrupt device operations. The CVSS v3.1 base score is 7.8, reflecting high severity with local attack vector, low attack complexity, low privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was reserved in November 2025 and published in March 2026. Although no known exploits are reported in the wild, the presence of a patch (Patch ID: WCNCR00465314) indicates vendor acknowledgment and remediation availability. The vulnerability affects embedded wireless components widely used in consumer electronics, IoT devices, and networking equipment, making it a significant concern for device manufacturers and end users relying on MediaTek chipsets.

Potential Impact

The vulnerability allows a local attacker with user-level access to escalate privileges on devices using affected MediaTek chipsets. This can lead to full system compromise, including unauthorized access to sensitive data, installation of persistent malware, disruption of wireless communications, and potential lateral movement within networks. Given the widespread deployment of MediaTek chipsets in smartphones, IoT devices, and wireless routers, the impact spans multiple sectors including consumer electronics, telecommunications, and enterprise networking. Compromised devices could be used as entry points for broader network attacks or for espionage. The lack of user interaction required for exploitation increases the risk of automated attacks or worm-like propagation in environments where multiple vulnerable devices coexist. Organizations relying on these chipsets may face operational disruptions, data breaches, and reputational damage if the vulnerability is exploited.

Mitigation Recommendations

Organizations and device manufacturers should immediately identify devices using the affected MediaTek chipset models (MT7902, MT7920, MT7921, MT7922, MT7925, MT7927) and apply the vendor-provided patch (Patch ID: WCNCR00465314) as soon as it becomes available. Until patches are deployed, implement strict local access controls to limit user-level access to trusted personnel only, reducing the risk of local exploitation. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts or anomalous driver behavior. Network segmentation can help contain compromised devices and prevent lateral movement. For IoT deployments, consider network-level protections such as device authentication and anomaly detection to identify compromised devices. Regularly update device firmware and drivers to incorporate security fixes. Additionally, conduct security audits and penetration testing focused on wireless driver components to proactively identify and remediate similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac6a

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/30/2026, 7:38:05 PM

Last updated: 4/13/2026, 1:52:12 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses