Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20442: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2026-20442cvecve-2026-20442cwe-416
Published: Mon Mar 02 2026 (03/02/2026, 08:39:25 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2026-20442 is a use-after-free vulnerability in the display component of multiple MediaTek SoCs affecting Android versions 14. 0, 15. 0, and 16. 0. It can cause a system crash leading to a local denial of service if an attacker has already obtained system-level privileges. Exploitation does not require user interaction, but the attacker must have system privilege beforehand. The vulnerability affects a wide range of MediaTek chipsets commonly used in smartphones and other devices. No known exploits are currently reported in the wild. A patch has been identified but not linked. Due to the requirement of prior system privilege, the impact is limited to denial of service rather than privilege escalation or remote code execution.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:11:20 UTC

Technical Analysis

CVE-2026-20442 is a use-after-free vulnerability classified under CWE-416 found in the display subsystem of numerous MediaTek System on Chips (SoCs), including models MT6739 through MT8883. This vulnerability affects devices running Android versions 14.0, 15.0, and 16.0. The flaw arises when the display component improperly manages memory, leading to a use-after-free condition that can cause the system to crash. Exploitation requires the attacker to have already obtained system-level privileges on the device, but no user interaction is needed to trigger the vulnerability. The consequence of exploitation is a local denial of service (DoS), where the device becomes unstable or crashes, disrupting normal operation. While this vulnerability does not allow privilege escalation or remote code execution on its own, it can be leveraged by attackers who have already compromised the system to cause further disruption. The vulnerability was reserved in November 2025 and published in March 2026. Although no known exploits are reported in the wild, the broad range of affected MediaTek chipsets, which are widely used in smartphones and IoT devices, increases the potential attack surface. A patch has been identified (Patch ID: ALPS10436998), but no direct links to the patch are provided. The vulnerability highlights the importance of secure memory management in embedded device components, especially in widely deployed mobile chipsets.

Potential Impact

The primary impact of CVE-2026-20442 is a local denial of service caused by system crashes due to use-after-free in the display subsystem. For organizations, this can translate into device instability, loss of availability, and potential disruption of business operations relying on affected mobile devices or embedded systems. Since exploitation requires prior system-level privileges, the vulnerability does not directly enable initial compromise or privilege escalation, limiting its impact to post-compromise disruption. However, in environments where devices are critical for communication, authentication, or operational control, forced reboots or crashes can degrade service reliability and user trust. The wide range of affected MediaTek chipsets means many consumer and enterprise devices globally could be impacted if patches are not applied. Additionally, denial of service on mobile devices can hinder incident response or recovery efforts during an attack. The lack of user interaction requirement makes the vulnerability easier to exploit once system access is obtained. Overall, the impact is significant for availability but limited for confidentiality and integrity.

Mitigation Recommendations

To mitigate CVE-2026-20442, organizations and device manufacturers should prioritize deploying the official patch identified as ALPS10436998 from MediaTek or their device vendors. Since the vulnerability requires system-level privileges for exploitation, strengthening overall device security to prevent initial compromise is critical. This includes enforcing strong access controls, applying timely security updates, and using endpoint protection solutions to detect privilege escalation attempts. Device administrators should monitor for unusual system crashes or reboots that could indicate exploitation attempts. For environments with critical mobile device usage, consider implementing device management policies that restrict installation of untrusted applications and enforce security baselines. Vendors should conduct thorough testing of the patch to ensure stability and compatibility. Additionally, organizations should maintain incident response plans that account for potential denial of service scenarios on mobile endpoints. Network segmentation and limiting device exposure can reduce the risk of attackers gaining system privileges required to exploit this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.012Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ae32ffcdb8a2d8ace5

Added to database: 3/2/2026, 8:56:14 AM

Last enriched: 3/2/2026, 9:11:20 AM

Last updated: 3/2/2026, 10:19:17 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-2584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ciser System SL CSIP firmware

Critical
VulnerabilityMon Mar 02 2026

CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798

High
VulnerabilityMon Mar 02 2026

CVE-2026-20444: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20443: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20441: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6991, MT8678, MT8793

High
VulnerabilityMon Mar 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses