CVE-2025-20764
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: MediaTek, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | 14.0 | |
| android | 15.0 | |
| android | 16.0 | |
| mediatek | mt6739 | * |
| mediatek | mt6761 | * |
| mediatek | mt6765 | * |
| mediatek | mt6768 | * |
| mediatek | mt6781 | * |
| mediatek | mt6789 | * |
| mediatek | mt6833 | * |
| mediatek | mt6835 | * |
| mediatek | mt6853 | * |
| mediatek | mt6855 | * |
| mediatek | mt6877 | * |
| mediatek | mt6878 | * |
| mediatek | mt6879 | * |
| mediatek | mt6883 | * |
| mediatek | mt6885 | * |
| mediatek | mt6886 | * |
| mediatek | mt6889 | * |
| mediatek | mt6893 | * |
| mediatek | mt6895 | * |
| mediatek | mt6897 | * |
| mediatek | mt6899 | * |
| mediatek | mt6983 | * |
| mediatek | mt6985 | * |
| mediatek | mt6989 | * |
| mediatek | mt6991 | * |
| mediatek | mt8196 | * |
| mediatek | mt8676 | * |
| mediatek | mt8678 | * |
| mediatek | mt8792 | * |
| mediatek | mt8793 | * |
| mediatek | mt8796 | * |
| mediatek | mt8873 | * |
| mediatek | mt8893 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out of bounds write in the smi component caused by a missing bounds check. It allows a malicious actor who already has System privilege to escalate their privileges locally without needing any user interaction.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to local escalation of privilege, meaning an attacker with System privilege could gain higher or unauthorized access, potentially compromising system security.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch identified as ALPS10259774 provided by the vendor to fix the out of bounds write vulnerability.