Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20441: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6991, MT8678, MT8793

0
High
VulnerabilityCVE-2026-20441cvecve-2026-20441cwe-787
Published: Mon Mar 02 2026 (03/02/2026, 08:39:23 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2718, MT6899, MT6991, MT8678, MT8793

Description

CVE-2026-20441 is an out-of-bounds write vulnerability (CWE-787) found in MediaTek chipsets MT2718, MT6899, MT6991, MT8678, and MT8793 running Android 15. 0. The flaw exists in the MAE component due to a missing bounds check, allowing a local attacker with System privileges to escalate privileges further. Exploitation does not require user interaction, increasing the risk in compromised environments. Although no known exploits are currently in the wild, the vulnerability could enable attackers to corrupt memory, potentially leading to arbitrary code execution or system instability. This vulnerability affects devices using these MediaTek chipsets, which are common in various consumer electronics. A patch identified as ALPS10432500 addresses the issue, but no public patch links are available yet. Organizations relying on affected devices should prioritize applying updates once available to prevent exploitation. The severity is assessed as high due to the potential for privilege escalation without user interaction and the broad impact on device integrity and security.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:11:36 UTC

Technical Analysis

CVE-2026-20441 is a security vulnerability classified as an out-of-bounds write (CWE-787) affecting several MediaTek chipsets: MT2718, MT6899, MT6991, MT8678, and MT8793. This flaw resides in the MAE (MediaTek Application Environment) component, where a missing bounds check allows writing outside the intended memory buffer. Such out-of-bounds writes can corrupt adjacent memory, leading to unpredictable behavior including privilege escalation or arbitrary code execution. The vulnerability requires the attacker to already have System-level privileges on the device, meaning it is a local escalation of privilege rather than a remote attack vector. No user interaction is needed, which simplifies exploitation once initial access is obtained. The affected platform is Android 15.0 running on these chipsets, which are widely used in smartphones and IoT devices. Although no public exploits are known, the vulnerability poses a significant risk due to the potential to compromise system integrity and security. MediaTek has assigned a patch ID ALPS10432500 to address this issue, but as of now, no patch links are publicly available. The vulnerability was reserved in November 2025 and published in March 2026, indicating a recent discovery and disclosure. The absence of a CVSS score necessitates an independent severity assessment based on the technical details.

Potential Impact

The primary impact of CVE-2026-20441 is local privilege escalation on devices using affected MediaTek chipsets running Android 15.0. An attacker who has already obtained System privileges can exploit this vulnerability to write out-of-bounds in memory, potentially leading to arbitrary code execution with elevated privileges or system instability. This can compromise the confidentiality, integrity, and availability of the device. For organizations, this means that if an attacker gains initial foothold (e.g., through another vulnerability or insider threat), they could leverage this flaw to gain deeper control over devices, bypass security controls, or persist undetected. This is particularly critical for environments relying on these chipsets in mobile devices, IoT endpoints, or embedded systems where device integrity is paramount. The lack of user interaction requirement increases the risk in compromised systems. Although no exploits are currently known in the wild, the vulnerability could be weaponized in targeted attacks or malware campaigns, especially in sectors with high-value data or critical infrastructure. Failure to patch could lead to data breaches, device manipulation, or denial of service conditions.

Mitigation Recommendations

1. Apply the official patch ALPS10432500 from MediaTek as soon as it becomes available and is distributed by device manufacturers or vendors. 2. Monitor vendor advisories and update device firmware or operating system images promptly to incorporate the fix. 3. Restrict System-level access on devices to trusted administrators only, minimizing the risk of an attacker obtaining initial System privileges. 4. Employ runtime protections such as memory protection mechanisms (e.g., DEP, ASLR) that may mitigate exploitation attempts. 5. Implement strong endpoint security controls to detect and prevent privilege escalation attempts, including behavioral monitoring and anomaly detection. 6. For organizations deploying affected devices, conduct regular security audits and vulnerability assessments to identify potential exploitation attempts. 7. Limit physical and local access to devices to reduce the risk of local attacks. 8. Educate users and administrators about the importance of timely updates and the risks associated with privilege escalation vulnerabilities. 9. Consider network segmentation and least privilege principles to contain potential compromises. 10. Maintain incident response readiness to quickly address any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.012Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ae32ffcdb8a2d8ace2

Added to database: 3/2/2026, 8:56:14 AM

Last enriched: 3/2/2026, 9:11:36 AM

Last updated: 3/2/2026, 10:33:55 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-2584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ciser System SL CSIP firmware

Critical
VulnerabilityMon Mar 02 2026

CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798

High
VulnerabilityMon Mar 02 2026

CVE-2026-20444: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20443: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20442: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses