Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20424: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6991, MT6993, MT8196, MT8678, MT8793

0
Medium
VulnerabilityCVE-2026-20424cvecve-2026-20424cwe-125
Published: Mon Mar 02 2026 (03/02/2026, 08:39:31 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6991, MT6993, MT8196, MT8678, MT8793

Description

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5540.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:15:46 UTC

Technical Analysis

CVE-2026-20424 is a security vulnerability classified under CWE-125 (Out-of-bounds Read) affecting multiple MediaTek display chipsets: MT6991, MT6993, MT8196, MT8678, and MT8793. The vulnerability is present in the display component of these chipsets and stems from a missing bounds check during memory access operations. This flaw allows an attacker who has already obtained System-level privileges on the device to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to local information disclosure, potentially exposing sensitive data stored in adjacent memory regions. The vulnerability affects devices running Android versions 15.0 and 16.0 that incorporate these MediaTek chipsets. Exploitation does not require user interaction, increasing the risk once system-level access is achieved. However, the attacker must have already compromised the system to System privilege level, which limits the initial attack vector. No public exploits have been reported so far, but the issue has been officially published and assigned the identifier CVE-2026-20424. MediaTek has issued a patch (ALPS10320471) to address this vulnerability. The absence of a CVSS score necessitates an independent severity assessment based on the impact and exploitability characteristics.

Potential Impact

The primary impact of CVE-2026-20424 is local information disclosure due to out-of-bounds memory reads. An attacker with System privileges can exploit this vulnerability to access sensitive data beyond intended memory boundaries, potentially including cryptographic keys, personal user data, or other confidential information. Although this vulnerability does not directly enable remote code execution or denial of service, the exposure of sensitive information can facilitate further attacks, such as privilege escalation or targeted data theft. The requirement for System-level privileges limits the initial attack surface, but in environments where attackers have already compromised devices, this vulnerability can exacerbate the damage. Organizations deploying devices with affected MediaTek chipsets running Android 15 or 16 could face risks to data confidentiality, especially in sectors handling sensitive or regulated information. The lack of user interaction for exploitation increases the risk in compromised environments. Overall, the vulnerability poses a moderate to high risk depending on the context of device usage and existing security controls.

Mitigation Recommendations

To mitigate CVE-2026-20424, organizations and device manufacturers should promptly apply the official patch ALPS10320471 provided by MediaTek. Device vendors should ensure that firmware and Android OS updates incorporating this patch are distributed and installed on all affected devices. Security teams should verify that devices running Android 15.0 and 16.0 with MediaTek MT6991, MT6993, MT8196, MT8678, or MT8793 chipsets are updated to the patched versions. Additionally, organizations should enforce strict privilege management to limit the number of users or processes with System-level access, reducing the likelihood of exploitation. Employing runtime memory protection mechanisms and continuous monitoring for anomalous memory access patterns can help detect exploitation attempts. Regular security audits and penetration testing focusing on privilege escalation and memory safety issues are recommended. Finally, educating users and administrators about the importance of timely updates and privilege restrictions will further reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac6d

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/2/2026, 9:15:46 AM

Last updated: 3/2/2026, 7:42:32 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses