CVE-2026-20451
Received Received - Intake
Out of Bounds Write in slbc Local Privilege Escalation

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: MediaTek, Inc.

Description
In slbc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10828685; Issue ID: MSV-6504.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mediatek slbc to ALPS10828685 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-843 The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Mediatek slbc component and is caused by a possible out of bounds write due to type confusion.

Type confusion occurs when a program mistakenly treats a piece of memory as a different type than it actually is, which can lead to unexpected behavior such as writing data outside the intended memory boundaries.

Exploiting this vulnerability could allow a malicious actor who already has System privilege to escalate their privileges locally without requiring any user interaction.


How can this vulnerability impact me? :

If exploited, this vulnerability could lead to local escalation of privilege, meaning an attacker with existing System privileges could gain higher or unauthorized privileges on the affected system.

This could allow the attacker to perform actions that are normally restricted, potentially compromising system integrity and security.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, apply the security patch identified as ALPS10828685 provided by MediaTek.

Since the vulnerability allows local escalation of privilege without user interaction, ensuring that your system is updated with the latest patches is critical.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart