Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20427: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

0
Medium
VulnerabilityCVE-2026-20427cvecve-2026-20427cwe-787
Published: Mon Mar 02 2026 (03/02/2026, 08:39:04 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

Description

In display, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5537.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:15:00 UTC

Technical Analysis

CVE-2026-20427 is a security vulnerability classified as CWE-787 (Out-of-bounds Write) found in the display subsystem of numerous MediaTek System on Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, and MT8793. These SoCs are widely used in Android devices running versions 14.0 through 16.0. The vulnerability arises from a missing bounds check in the display driver code, which allows an attacker with System-level privileges to perform an out-of-bounds write. This memory corruption can lead to escalation of privileges beyond the System level, potentially granting the attacker higher control over the device. Exploitation does not require user interaction, making it easier for an attacker who already has System privileges to leverage this flaw. However, initial compromise to System privilege is a prerequisite, which limits the attack surface primarily to local attackers or malware that has already gained elevated access. No public exploits or active exploitation have been reported to date. The vendor has acknowledged the issue with patch ID ALPS10320471 and issue ID MSV-5537, but no public patch links are currently available. The vulnerability affects confidentiality, integrity, and availability by enabling privilege escalation, which could allow attackers to bypass security controls, access sensitive data, or disrupt device functionality.

Potential Impact

The primary impact of CVE-2026-20427 is local privilege escalation on affected Android devices using MediaTek SoCs. An attacker who has already obtained System privileges can exploit this vulnerability to gain higher privileges, potentially reaching root or kernel-level access. This escalation can lead to complete device compromise, allowing attackers to install persistent malware, access or modify sensitive user data, disable security features, or disrupt device operations. Since the vulnerability affects a broad range of MediaTek chipsets embedded in many mid-range and budget Android smartphones, the scale of impact is significant, potentially affecting millions of users worldwide. Organizations relying on mobile devices with these chipsets for sensitive communications or operations face increased risk of data breaches and operational disruptions. The lack of required user interaction simplifies exploitation once System access is obtained, increasing the threat to environments where local access is possible. However, the prerequisite of System privilege limits remote exploitation, reducing the likelihood of widespread remote attacks. The absence of known exploits in the wild currently reduces immediate risk but underscores the importance of timely patching to prevent future exploitation.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the missing bounds check in the display driver. 2. Enforce strict privilege separation and minimize the number of processes running with System-level privileges to reduce the attack surface. 3. Implement runtime protections such as memory corruption mitigations (e.g., AddressSanitizer, Control Flow Integrity) in the display driver code to detect and prevent out-of-bounds writes. 4. Monitor device logs and behavior for unusual local activity indicative of privilege escalation attempts, such as unexpected process launches or modifications to system files. 5. Restrict physical and local access to devices, especially in high-security environments, to prevent attackers from gaining initial System privileges. 6. Educate users and administrators about the risks of installing untrusted applications or rooting devices, which could facilitate initial System privilege acquisition. 7. Collaborate with device vendors to ensure timely security updates and verify patch deployment across device fleets. 8. Employ mobile device management (MDM) solutions to enforce security policies and update compliance status regularly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac76

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/2/2026, 9:15:00 AM

Last updated: 3/2/2026, 11:05:37 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses