Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20444: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

0
High
VulnerabilityCVE-2026-20444cvecve-2026-20444cwe-787
Published: Mon Mar 02 2026 (03/02/2026, 08:39:29 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

Description

CVE-2026-20444 is a memory corruption vulnerability due to an out-of-bounds write in MediaTek display components affecting numerous MediaTek SoCs used in Android devices. The flaw arises from a missing bounds check, enabling local privilege escalation if an attacker already has System-level privileges. Exploitation does not require user interaction, increasing risk in compromised environments. Although no known exploits are currently in the wild, the vulnerability affects multiple Android versions (14. 0, 15. 0, 16. 0) and a broad range of MediaTek chipsets widely deployed in smartphones globally. Successful exploitation could lead to system instability or further privilege escalation, potentially undermining device security. Mitigation requires applying vendor patches promptly and restricting System-level access to trusted processes only. Countries with large markets for MediaTek-based Android devices and significant mobile user bases are at higher risk.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:10:52 UTC

Technical Analysis

CVE-2026-20444 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a wide range of MediaTek System-on-Chip (SoC) models, including MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, and MT8883. These SoCs are integrated into many Android devices running versions 14.0, 15.0, and 16.0. The vulnerability exists in the display subsystem where a missing bounds check leads to an out-of-bounds write, causing memory corruption. This flaw can be exploited locally by an attacker who already has System privileges on the device, enabling escalation of privileges further or causing system instability. Notably, exploitation does not require any user interaction, which increases the risk in environments where System-level access is compromised. The vulnerability was publicly disclosed on March 2, 2026, but no known exploits have been detected in the wild to date. The patch identifier is ALPS10436995, and the issue is tracked as MSV-5721 by MediaTek. The lack of a CVSS score necessitates an independent severity assessment. Given the broad range of affected chipsets and Android versions, the vulnerability has a wide attack surface. However, the requirement for prior System privilege limits exploitation to scenarios where the attacker already has significant access, such as through other vulnerabilities or insider threats.

Potential Impact

The primary impact of CVE-2026-20444 is local escalation of privilege on affected Android devices using MediaTek SoCs. An attacker with System privileges can exploit the out-of-bounds write to corrupt memory, potentially gaining higher privileges or causing denial of service through system instability or crashes. This could undermine the security model of the device, allowing malicious code to execute with elevated rights, access sensitive data, or disable security controls. The vulnerability affects a broad range of MediaTek chipsets widely used in mid-range and budget smartphones globally, increasing the potential scale of impact. Organizations relying on such devices for sensitive communications or operations could face increased risk of device compromise. Although exploitation requires prior System-level access, this vulnerability can be chained with other exploits to deepen control over the device. The absence of user interaction for exploitation means automated or stealthy attacks are possible once initial access is obtained. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as patches are not yet universally deployed.

Mitigation Recommendations

1. Apply the official MediaTek patch ALPS10436995 as soon as it becomes available and is verified for your device model and Android version. 2. Restrict System-level privileges strictly to trusted applications and services to reduce the likelihood of an attacker obtaining the required initial access. 3. Employ robust endpoint security solutions that monitor for unusual local privilege escalation attempts or memory corruption indicators within the display subsystem. 4. Implement strict application whitelisting and integrity checks to prevent unauthorized code execution at System level. 5. Regularly update Android OS and device firmware to incorporate security fixes and reduce exposure to chained exploits. 6. For organizations deploying MediaTek-based devices, conduct security audits focusing on privilege management and local access controls. 7. Educate users and administrators about the risks of rooting devices or installing untrusted software that could grant System privileges. 8. Monitor security advisories from MediaTek and Android vendors for updates or new mitigations related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.012Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ae32ffcdb8a2d8aceb

Added to database: 3/2/2026, 8:56:14 AM

Last enriched: 3/2/2026, 9:10:52 AM

Last updated: 3/2/2026, 10:18:15 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-2584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ciser System SL CSIP firmware

Critical
VulnerabilityMon Mar 02 2026

CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798

High
VulnerabilityMon Mar 02 2026

CVE-2026-20443: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20442: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20441: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6991, MT8678, MT8793

High
VulnerabilityMon Mar 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses