Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20426: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

0
Medium
VulnerabilityCVE-2026-20426cvecve-2026-20426cwe-787
Published: Mon Mar 02 2026 (03/02/2026, 08:39:01 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

Description

In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5538.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:15:15 UTC

Technical Analysis

CVE-2026-20426 is a security vulnerability classified as CWE-787 (Out-of-bounds Write) found in the display subsystem of numerous MediaTek System-on-Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, and MT8793. These SoCs are integrated into a wide range of Android devices running Android versions 14.0 through 16.0. The vulnerability arises from a missing bounds check in the display driver code, which allows an out-of-bounds write operation. This flaw can be exploited by a local attacker who already possesses System-level privileges to escalate their privileges further, potentially gaining higher-level control over the device. Notably, exploitation does not require any user interaction, increasing the risk of automated or stealthy attacks once System access is obtained. However, the attacker must have already compromised the device to the extent of gaining System privileges, which limits the initial attack vector. No public exploits or active exploitation in the wild have been reported to date. The issue was reserved in November 2025 and published in March 2026, with MediaTek identified as the assigner. Although no CVSS score has been assigned, the vulnerability's characteristics suggest a significant risk to confidentiality, integrity, and availability within affected devices. The lack of a patch link indicates that fixes may be pending or distributed through vendor-specific updates. Overall, this vulnerability represents a critical component-level flaw that could be leveraged in complex attack chains targeting Android devices with MediaTek chipsets.

Potential Impact

The primary impact of CVE-2026-20426 is the potential for local privilege escalation on affected Android devices, allowing attackers with System privileges to gain even higher levels of control. This can lead to unauthorized access to sensitive data, modification of system components, or persistent malware installation. Since the vulnerability affects the display driver, it could also impact device stability or availability if exploited maliciously. Organizations relying on Android devices with MediaTek chipsets, including enterprises issuing such devices to employees, could face increased risk of device compromise and data leakage. The broad range of affected chipsets means a large number of consumer and enterprise devices worldwide are potentially vulnerable. Although exploitation requires prior System-level access, attackers who achieve this initial foothold can leverage the vulnerability to bypass security controls and hardening measures. This elevates the threat level in environments where device security is critical, such as government, financial, and healthcare sectors. The absence of known exploits in the wild reduces immediate risk but underscores the importance of proactive mitigation to prevent future attacks. The vulnerability could also be chained with other exploits to facilitate full device takeover or evade detection.

Mitigation Recommendations

To mitigate CVE-2026-20426, organizations and users should prioritize applying official security patches from device manufacturers and MediaTek as soon as they become available. Since the vulnerability requires System-level privileges for exploitation, enforcing strict application sandboxing and minimizing the attack surface by limiting privileged app installations can reduce risk. Employing mobile device management (MDM) solutions to monitor and control device configurations and installed software helps detect and prevent unauthorized privilege escalations. Regularly updating devices to the latest Android versions and security updates is critical. Additionally, implementing runtime protections such as SELinux enforcing mode and integrity verification mechanisms can help contain exploitation attempts. For enterprises, restricting physical access to devices and educating users about the risks of installing untrusted applications can further reduce the likelihood of initial System privilege compromise. Security teams should also monitor for unusual device behavior indicative of privilege escalation attempts. Finally, collaborating with vendors to obtain timely patches and security advisories ensures rapid response to emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac73

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/2/2026, 9:15:15 AM

Last updated: 3/2/2026, 7:51:26 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses