CVE-2025-20766
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: MediaTek, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | 14.0 | |
| android | 15.0 | |
| android | 16.0 | |
| mediatek | mt2718 | * |
| mediatek | mt6739 | * |
| mediatek | mt6761 | * |
| mediatek | mt6765 | * |
| mediatek | mt6768 | * |
| mediatek | mt6781 | * |
| mediatek | mt6789 | * |
| mediatek | mt6833 | * |
| mediatek | mt6835 | * |
| mediatek | mt6853 | * |
| mediatek | mt6855 | * |
| mediatek | mt6877 | * |
| mediatek | mt6878 | * |
| mediatek | mt6879 | * |
| mediatek | mt6883 | * |
| mediatek | mt6885 | * |
| mediatek | mt6886 | * |
| mediatek | mt6889 | * |
| mediatek | mt6893 | * |
| mediatek | mt6895 | * |
| mediatek | mt6897 | * |
| mediatek | mt6899 | * |
| mediatek | mt6983 | * |
| mediatek | mt6985 | * |
| mediatek | mt6989 | * |
| mediatek | mt6991 | * |
| mediatek | mt8196 | * |
| mediatek | mt8676 | * |
| mediatek | mt8678 | * |
| mediatek | mt8792 | * |
| mediatek | mt8793 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-457 | The code uses a variable that has not been initialized, leading to unpredictable or unintended results. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory corruption issue in the display component caused by improper input validation. It can be exploited locally by an attacker who already has System privileges, potentially allowing them to escalate their privileges further. Exploitation does not require any user interaction.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with existing System privileges to escalate their privileges further, potentially gaining higher control over the affected system. This could lead to unauthorized actions or compromise of system integrity.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch identified as ALPS10196993 to fix the memory corruption issue and prevent local escalation of privilege.