Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798

0
High
VulnerabilityCVE-2026-20445cvecve-2026-20445cwe-367
Published: Mon Mar 02 2026 (03/02/2026, 08:39:35 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798

Description

CVE-2026-20445 is a race condition vulnerability (CWE-367) affecting multiple MediaTek chipsets used in Android devices running versions 14. 0, 15. 0, and 16. 0. The flaw exists in the MediaTek Data Path (MDDP) component and can cause a system crash leading to a local denial of service. Exploitation requires the attacker to already have System-level privileges, and no user interaction is needed. Although no known exploits are currently in the wild, the vulnerability could be leveraged to disrupt device availability. A patch has been identified (ALPS10289875), but no public patch links are available yet. The vulnerability impacts a broad range of MediaTek SoCs commonly found in smartphones and other mobile devices. Organizations relying on devices with these chipsets should prioritize patching once updates are released to prevent potential service disruptions.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:10:33 UTC

Technical Analysis

CVE-2026-20445 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, affecting a wide range of MediaTek System-on-Chips (SoCs) including MT6835 through MT8798 series. The vulnerability resides within the MediaTek Data Path (MDDP) component, which handles critical data processing tasks on affected devices. The race condition can cause inconsistent state checks leading to a system crash, effectively resulting in a local denial of service (DoS). Exploitation requires the attacker to have already obtained System-level privileges on the device, meaning it is not exploitable remotely or by unprivileged users. No user interaction is required for exploitation, increasing the risk if an attacker gains elevated access. The affected Android versions include 14.0, 15.0, and 16.0, which are recent and upcoming releases, indicating a broad impact on modern devices. While no public exploits are known at this time, the vulnerability's presence in widely deployed chipsets makes it a significant concern. MediaTek has assigned a patch ID (ALPS10289875) and issue ID (MSV-5184) for remediation, though no public patch links are currently available. The vulnerability's root cause is a classic TOCTOU race condition, where the system's state is checked and then used without proper synchronization, allowing an attacker with system privileges to trigger a crash by exploiting timing windows. This can disrupt device availability and potentially impact dependent services.

Potential Impact

The primary impact of CVE-2026-20445 is a local denial of service through system crashes on devices using affected MediaTek chipsets. Organizations deploying smartphones, tablets, or IoT devices with these chipsets may face service interruptions, device instability, or operational disruptions if exploited. Since exploitation requires System privileges, the vulnerability is less likely to be used for initial compromise but can be leveraged post-compromise to escalate denial of service attacks. This could affect enterprise mobile device management, critical communications, and consumer device reliability. The broad range of affected chipsets and Android versions increases the scope of impact globally, especially in markets where MediaTek SoCs are prevalent. Additionally, denial of service on mobile devices can disrupt business continuity, emergency communications, and user productivity. Although no remote exploitation or user interaction is needed, the prerequisite of elevated privileges limits the attack vector primarily to scenarios where attackers have already penetrated device defenses. Still, the vulnerability poses a risk to device manufacturers, mobile carriers, and end-users relying on stable device operation.

Mitigation Recommendations

To mitigate CVE-2026-20445, organizations and device users should: 1) Monitor MediaTek and device OEM advisories for official patches corresponding to patch ID ALPS10289875 and apply updates promptly once available. 2) Restrict and monitor access to System-level privileges on devices to prevent attackers from gaining the necessary elevated access to exploit this vulnerability. 3) Employ robust endpoint security solutions on mobile devices to detect and prevent privilege escalation attempts that could lead to exploitation. 4) Implement runtime protections and integrity checks to detect abnormal process behavior indicative of race condition exploitation. 5) For enterprise environments, enforce strict mobile device management (MDM) policies to control app installations and privilege escalations. 6) Conduct regular security audits and vulnerability assessments on devices using affected MediaTek chipsets. 7) Educate users and administrators about the risks of rooting or jailbreaking devices, which can increase exposure to privilege escalation and subsequent exploitation. 8) Consider network-level protections to detect anomalous device behavior that may indicate exploitation attempts. These targeted steps go beyond generic patching advice by emphasizing privilege management and proactive detection to reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.012Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550b032ffcdb8a2d8ad3b

Added to database: 3/2/2026, 8:56:16 AM

Last enriched: 3/2/2026, 9:10:33 AM

Last updated: 3/2/2026, 10:16:55 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-2584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ciser System SL CSIP firmware

Critical
VulnerabilityMon Mar 02 2026

CVE-2026-20444: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20443: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20442: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883

High
VulnerabilityMon Mar 02 2026

CVE-2026-20441: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6991, MT8678, MT8793

High
VulnerabilityMon Mar 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses