CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798
CVE-2026-20445 is a race condition vulnerability (CWE-367) affecting multiple MediaTek chipsets used in Android devices running versions 14. 0, 15. 0, and 16. 0. The flaw exists in the MediaTek Data Path (MDDP) component and can cause a system crash leading to a local denial of service. Exploitation requires the attacker to already have System-level privileges, and no user interaction is needed. Although no known exploits are currently in the wild, the vulnerability could be leveraged to disrupt device availability. A patch has been identified (ALPS10289875), but no public patch links are available yet. The vulnerability impacts a broad range of MediaTek SoCs commonly found in smartphones and other mobile devices. Organizations relying on devices with these chipsets should prioritize patching once updates are released to prevent potential service disruptions.
AI Analysis
Technical Summary
CVE-2026-20445 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, affecting a wide range of MediaTek System-on-Chips (SoCs) including MT6835 through MT8798 series. The vulnerability resides within the MediaTek Data Path (MDDP) component, which handles critical data processing tasks on affected devices. The race condition can cause inconsistent state checks leading to a system crash, effectively resulting in a local denial of service (DoS). Exploitation requires the attacker to have already obtained System-level privileges on the device, meaning it is not exploitable remotely or by unprivileged users. No user interaction is required for exploitation, increasing the risk if an attacker gains elevated access. The affected Android versions include 14.0, 15.0, and 16.0, which are recent and upcoming releases, indicating a broad impact on modern devices. While no public exploits are known at this time, the vulnerability's presence in widely deployed chipsets makes it a significant concern. MediaTek has assigned a patch ID (ALPS10289875) and issue ID (MSV-5184) for remediation, though no public patch links are currently available. The vulnerability's root cause is a classic TOCTOU race condition, where the system's state is checked and then used without proper synchronization, allowing an attacker with system privileges to trigger a crash by exploiting timing windows. This can disrupt device availability and potentially impact dependent services.
Potential Impact
The primary impact of CVE-2026-20445 is a local denial of service through system crashes on devices using affected MediaTek chipsets. Organizations deploying smartphones, tablets, or IoT devices with these chipsets may face service interruptions, device instability, or operational disruptions if exploited. Since exploitation requires System privileges, the vulnerability is less likely to be used for initial compromise but can be leveraged post-compromise to escalate denial of service attacks. This could affect enterprise mobile device management, critical communications, and consumer device reliability. The broad range of affected chipsets and Android versions increases the scope of impact globally, especially in markets where MediaTek SoCs are prevalent. Additionally, denial of service on mobile devices can disrupt business continuity, emergency communications, and user productivity. Although no remote exploitation or user interaction is needed, the prerequisite of elevated privileges limits the attack vector primarily to scenarios where attackers have already penetrated device defenses. Still, the vulnerability poses a risk to device manufacturers, mobile carriers, and end-users relying on stable device operation.
Mitigation Recommendations
To mitigate CVE-2026-20445, organizations and device users should: 1) Monitor MediaTek and device OEM advisories for official patches corresponding to patch ID ALPS10289875 and apply updates promptly once available. 2) Restrict and monitor access to System-level privileges on devices to prevent attackers from gaining the necessary elevated access to exploit this vulnerability. 3) Employ robust endpoint security solutions on mobile devices to detect and prevent privilege escalation attempts that could lead to exploitation. 4) Implement runtime protections and integrity checks to detect abnormal process behavior indicative of race condition exploitation. 5) For enterprise environments, enforce strict mobile device management (MDM) policies to control app installations and privilege escalations. 6) Conduct regular security audits and vulnerability assessments on devices using affected MediaTek chipsets. 7) Educate users and administrators about the risks of rooting or jailbreaking devices, which can increase exposure to privilege escalation and subsequent exploitation. 8) Consider network-level protections to detect anomalous device behavior that may indicate exploitation attempts. These targeted steps go beyond generic patching advice by emphasizing privilege management and proactive detection to reduce exploitation likelihood.
Affected Countries
China, India, Indonesia, Vietnam, Philippines, Taiwan, Malaysia, Thailand, United States, Brazil, Russia, South Korea, Japan, Germany, United Kingdom
CVE-2026-20445: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in MediaTek, Inc. MT6835, MT6855, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8188, MT8678, MT8755, MT8771, MT8797, MT8798
Description
CVE-2026-20445 is a race condition vulnerability (CWE-367) affecting multiple MediaTek chipsets used in Android devices running versions 14. 0, 15. 0, and 16. 0. The flaw exists in the MediaTek Data Path (MDDP) component and can cause a system crash leading to a local denial of service. Exploitation requires the attacker to already have System-level privileges, and no user interaction is needed. Although no known exploits are currently in the wild, the vulnerability could be leveraged to disrupt device availability. A patch has been identified (ALPS10289875), but no public patch links are available yet. The vulnerability impacts a broad range of MediaTek SoCs commonly found in smartphones and other mobile devices. Organizations relying on devices with these chipsets should prioritize patching once updates are released to prevent potential service disruptions.
AI-Powered Analysis
Technical Analysis
CVE-2026-20445 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, affecting a wide range of MediaTek System-on-Chips (SoCs) including MT6835 through MT8798 series. The vulnerability resides within the MediaTek Data Path (MDDP) component, which handles critical data processing tasks on affected devices. The race condition can cause inconsistent state checks leading to a system crash, effectively resulting in a local denial of service (DoS). Exploitation requires the attacker to have already obtained System-level privileges on the device, meaning it is not exploitable remotely or by unprivileged users. No user interaction is required for exploitation, increasing the risk if an attacker gains elevated access. The affected Android versions include 14.0, 15.0, and 16.0, which are recent and upcoming releases, indicating a broad impact on modern devices. While no public exploits are known at this time, the vulnerability's presence in widely deployed chipsets makes it a significant concern. MediaTek has assigned a patch ID (ALPS10289875) and issue ID (MSV-5184) for remediation, though no public patch links are currently available. The vulnerability's root cause is a classic TOCTOU race condition, where the system's state is checked and then used without proper synchronization, allowing an attacker with system privileges to trigger a crash by exploiting timing windows. This can disrupt device availability and potentially impact dependent services.
Potential Impact
The primary impact of CVE-2026-20445 is a local denial of service through system crashes on devices using affected MediaTek chipsets. Organizations deploying smartphones, tablets, or IoT devices with these chipsets may face service interruptions, device instability, or operational disruptions if exploited. Since exploitation requires System privileges, the vulnerability is less likely to be used for initial compromise but can be leveraged post-compromise to escalate denial of service attacks. This could affect enterprise mobile device management, critical communications, and consumer device reliability. The broad range of affected chipsets and Android versions increases the scope of impact globally, especially in markets where MediaTek SoCs are prevalent. Additionally, denial of service on mobile devices can disrupt business continuity, emergency communications, and user productivity. Although no remote exploitation or user interaction is needed, the prerequisite of elevated privileges limits the attack vector primarily to scenarios where attackers have already penetrated device defenses. Still, the vulnerability poses a risk to device manufacturers, mobile carriers, and end-users relying on stable device operation.
Mitigation Recommendations
To mitigate CVE-2026-20445, organizations and device users should: 1) Monitor MediaTek and device OEM advisories for official patches corresponding to patch ID ALPS10289875 and apply updates promptly once available. 2) Restrict and monitor access to System-level privileges on devices to prevent attackers from gaining the necessary elevated access to exploit this vulnerability. 3) Employ robust endpoint security solutions on mobile devices to detect and prevent privilege escalation attempts that could lead to exploitation. 4) Implement runtime protections and integrity checks to detect abnormal process behavior indicative of race condition exploitation. 5) For enterprise environments, enforce strict mobile device management (MDM) policies to control app installations and privilege escalations. 6) Conduct regular security audits and vulnerability assessments on devices using affected MediaTek chipsets. 7) Educate users and administrators about the risks of rooting or jailbreaking devices, which can increase exposure to privilege escalation and subsequent exploitation. 8) Consider network-level protections to detect anomalous device behavior that may indicate exploitation attempts. These targeted steps go beyond generic patching advice by emphasizing privilege management and proactive detection to reduce exploitation likelihood.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.012Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a550b032ffcdb8a2d8ad3b
Added to database: 3/2/2026, 8:56:16 AM
Last enriched: 3/2/2026, 9:10:33 AM
Last updated: 3/2/2026, 10:16:55 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2584: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Ciser System SL CSIP firmware
CriticalCVE-2026-20444: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
HighCVE-2026-20443: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
HighCVE-2026-20442: CWE-416 Use After Free in MediaTek, Inc. MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8186, MT8188, MT8196, MT8667, MT8673, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8791T, MT8792, MT8793, MT8795T, MT8796, MT8798, MT8873, MT8883
HighCVE-2026-20441: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2718, MT6899, MT6991, MT8678, MT8793
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.