CVE-2025-20795
BaseFortify
Publication date: 2026-01-06
Last updated on: 2026-01-08
Assigner: MediaTek, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| android | 13.0 | |
| android | 14.0 | |
| android | 15.0 | |
| android | 16.0 | |
| mediatek | mt2718 | * |
| mediatek | mt6580 | * |
| mediatek | mt6739 | * |
| mediatek | mt6761 | * |
| mediatek | mt6765 | * |
| mediatek | mt6768 | * |
| mediatek | mt6779 | * |
| mediatek | mt6781 | * |
| mediatek | mt6785 | * |
| mediatek | mt6789 | * |
| mediatek | mt6833 | * |
| mediatek | mt6835 | * |
| mediatek | mt6853 | * |
| mediatek | mt6855 | * |
| mediatek | mt6873 | * |
| mediatek | mt6877 | * |
| mediatek | mt6878 | * |
| mediatek | mt6879 | * |
| mediatek | mt6883 | * |
| mediatek | mt6885 | * |
| mediatek | mt6886 | * |
| mediatek | mt6889 | * |
| mediatek | mt6893 | * |
| mediatek | mt6895 | * |
| mediatek | mt6897 | * |
| mediatek | mt6899 | * |
| mediatek | mt6983 | * |
| mediatek | mt6985 | * |
| mediatek | mt6989 | * |
| mediatek | mt6991 | * |
| mediatek | mt8186 | * |
| mediatek | mt8188 | * |
| mediatek | mt8195 | * |
| mediatek | mt8196 | * |
| mediatek | mt8370 | * |
| mediatek | mt8390 | * |
| mediatek | mt8391 | * |
| mediatek | mt8395 | * |
| mediatek | mt8676 | * |
| mediatek | mt8678 | * |
| mediatek | mt8696 | * |
| mediatek | mt8755 | * |
| mediatek | mt8766 | * |
| mediatek | mt8768 | * |
| mediatek | mt8781 | * |
| mediatek | mt8786 | * |
| mediatek | mt8788e | * |
| mediatek | mt8791t | * |
| mediatek | mt8792 | * |
| mediatek | mt8793 | * |
| mediatek | mt8796 | * |
| mediatek | mt8873 | * |
| mediatek | mt8883 | * |
| mediatek | mt8893 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in KeyInstall is due to a missing bounds check that can cause an out of bounds write. This means that the software may write data outside the intended memory area, potentially leading to unexpected behavior or security issues. Exploiting this vulnerability could allow a malicious actor who already has System privileges to escalate their privileges further locally without needing any user interaction.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to local escalation of privilege, meaning an attacker with existing System privileges could gain higher or more extensive privileges on the affected system. This could compromise system integrity and security, potentially allowing the attacker to perform unauthorized actions.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch identified as ALPS10276761 to fix the vulnerability in KeyInstall. Since the vulnerability requires local System privilege, ensure that only trusted users have such privileges and monitor for any unauthorized privilege escalations.