Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20429: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

0
Medium
VulnerabilityCVE-2026-20429cvecve-2026-20429cwe-125
Published: Mon Mar 02 2026 (03/02/2026, 08:39:33 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, MT8793

Description

In display, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10320471; Issue ID: MSV-5535.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:14:00 UTC

Technical Analysis

CVE-2026-20429 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the display subsystem of several MediaTek System on Chips (SoCs), including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8196, MT8678, and MT8793. These SoCs are commonly integrated into Android devices running Android versions 14.0, 15.0, and 16.0. The vulnerability arises from a missing bounds check in the display driver code, which allows an attacker with System-level privileges to perform an out-of-bounds read operation. This can lead to local information disclosure by reading memory areas outside the intended buffer boundaries. The flaw does not require user interaction for exploitation but does require that the attacker has already obtained System privileges on the device, which is a high-level privilege typically reserved for trusted system processes or root-level access. Although no public exploits have been reported in the wild, the vulnerability poses a risk of leaking sensitive information from kernel or driver memory. The issue was reserved in November 2025 and published in March 2026, with a patch identified internally (Patch ID: ALPS10320471; Issue ID: MSV-5535), though no public patch link is currently available. The vulnerability primarily impacts confidentiality, with no direct effect on system integrity or availability. The broad range of affected MediaTek SoCs indicates a wide potential impact across many Android devices globally that use these chipsets.

Potential Impact

The primary impact of CVE-2026-20429 is local information disclosure, which can compromise the confidentiality of sensitive data stored in memory. Since exploitation requires System-level privileges, the vulnerability does not directly enable privilege escalation or remote code execution but can be leveraged by attackers who have already compromised the device at a high privilege level to gain further intelligence about the system. This could facilitate subsequent attacks such as targeted exploitation, bypassing security controls, or extracting cryptographic keys and other sensitive information. The vulnerability affects a broad range of MediaTek SoCs used in many Android smartphones and tablets, potentially impacting millions of devices worldwide. Organizations relying on these devices for sensitive communications or operations could face increased risk of data leakage. The lack of user interaction requirement means that once System privileges are obtained, exploitation can be automated or performed stealthily. Although no known exploits exist currently, the vulnerability represents a latent risk that could be weaponized in the future. The overall impact is moderate to high for confidentiality but limited for availability and integrity.

Mitigation Recommendations

1. Apply official patches from MediaTek or device manufacturers as soon as they become available to address the missing bounds check in the display driver. 2. Restrict and monitor access to System-level privileges on affected devices to prevent attackers from reaching the required privilege level for exploitation. This includes enforcing strong device access controls, disabling unnecessary root access, and using mobile device management (MDM) solutions to enforce security policies. 3. Employ runtime protections such as memory protection mechanisms (e.g., Kernel Address Space Layout Randomization - KASLR) and exploit mitigation techniques to reduce the risk of memory disclosure. 4. Conduct regular security audits and vulnerability assessments on devices using affected MediaTek SoCs to detect signs of compromise or privilege escalation. 5. Educate users and administrators about the risks of rooting devices or installing untrusted applications that could lead to System privilege compromise. 6. Monitor threat intelligence sources for any emerging exploits targeting this vulnerability and respond promptly. 7. For organizations deploying custom Android builds, review and harden the display driver code and implement additional bounds checking where feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.011Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac7c

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/2/2026, 9:14:00 AM

Last updated: 3/2/2026, 7:46:36 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses