#VU107022 Out-of-bounds write in MediaTek products - CVE-2025-20656


Vulnerability identifier: #VU107022

Vulnerability risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-20656

CWE-ID: CWE-787

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
MT6781
Hardware solutions / Firmware
MT6789
Mobile applications / Mobile firmware & hardware
MT6835
Mobile applications / Mobile firmware & hardware
MT6855
Mobile applications / Mobile firmware & hardware
MT6878
Mobile applications / Mobile firmware & hardware
MT6879
Mobile applications / Mobile firmware & hardware
MT6886
Mobile applications / Mobile firmware & hardware
MT6895
Mobile applications / Mobile firmware & hardware
MT6897
Mobile applications / Mobile firmware & hardware
MT6983
Mobile applications / Mobile firmware & hardware
MT6985
Mobile applications / Mobile firmware & hardware
MT6989
Mobile applications / Mobile firmware & hardware
MT6990
Mobile applications / Mobile firmware & hardware
MT8196
Mobile applications / Mobile firmware & hardware
MT8370
Mobile applications / Mobile firmware & hardware
MT8390
Mobile applications / Mobile firmware & hardware

Vendor: MediaTek

Description

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within DA. A local application can execute arbitrary code.

Mitigation
Install security update from vendor's website.

Vulnerable software versions

MT6781: All versions

MT6789: All versions

MT6835: All versions

MT6855: All versions

MT6878: All versions

MT6879: All versions

MT6886: All versions

MT6895: All versions

MT6897: All versions

MT6983: All versions

MT6985: All versions

MT6989: All versions

MT6990: All versions

MT8196: All versions

MT8370: All versions

MT8390: All versions


External links
https://corp.mediatek.com/product-security-bulletin/April-2025


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability