March 2025 Product Security Bulletin

Published 2025-03-03
The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT, Computer Vision, Audio, and TV chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.

The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).


Summary

Severity CVEs
High CVE-2025-20644, CVE-2025-20645, CVE-2025-20646
Medium CVE-2025-20647, CVE-2025-20648, CVE-2025-20649, CVE-2025-20650, CVE-2025-20651, CVE-2025-20652, CVE-2025-20653


Details

CVE CVE-2025-20644
Title Syntactic correctness in Modem
Severity High
Vulnerability Type DoS
CWE CWE-1286 Syntactic Correctness
Description In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798
Affected Software Versions Modem NR15, NR16
Report Source External

CVE CVE-2025-20645
Title Out-of-bounds write in KeyInstall
Severity High
Vulnerability Type EoP
CWE CWE-787 Out-of-bounds Write
Description In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation.
Affected Chipsets MT6765, MT6768, MT6833, MT6835, MT6853, MT6855, MT6879, MT6886, MT6893, MT6897, MT6983, MT6985, MT6989, MT8796
Affected Software Versions Android 14.0, 15.0
Report Source Internal

CVE CVE-2025-20646
Title Out-of-bounds write in wlan
Severity High
Vulnerability Type EoP
CWE CWE-787 Out-of-bounds Write
Description In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6890, MT7915, MT7916, MT7981, MT7986
Affected Software Versions SDK release 7.6.7.2 and before
Report Source Internal

CVE CVE-2025-20647
Title Null pointer dereference in Modem
Severity Medium
Vulnerability Type DoS
CWE CWE-476 NULL Pointer Dereference
Description In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
Affected Software Versions Modem NR12A, NR13, NR15, NR16
Report Source External

CVE CVE-2025-20648
Title Out-of-bounds read in apu
Severity Medium
Vulnerability Type ID
CWE CWE-125 Out-of-bounds Read
Description In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT2718, MT6879, MT6989, MT8196, MT8370, MT8390, MT8395, MT8673, MT8678
Affected Software Versions Android 13.0, 14.0, 15.0
Report Source External

CVE CVE-2025-20649
Title Improper handling of insufficient permissions or privileges in Bluetooth
Severity Medium
Vulnerability Type ID
CWE CWE-280 Improper Handling of Insufficient Permissions or Privileges
Description In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6880, MT6890, MT6980, MT6990, MT7663, MT7902, MT7925, MT7927, MT7961
Affected Software Versions SDK release 3.6 and before / openWRT 23.05
Report Source Internal

CVE CVE-2025-20650
Title Out-of-bounds write in DA
Severity Medium
Vulnerability Type EoP
CWE CWE-787 Out-of-bounds Write
Description In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation.
Affected Chipsets MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678
Affected Software Versions Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1
Report Source Internal

CVE CVE-2025-20651
Title Out-of-bounds read in DA
Severity Medium
Vulnerability Type ID
CWE CWE-125 Out-of-bounds Read
Description In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation.
Affected Chipsets MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678
Affected Software Versions Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1
Report Source Internal

CVE CVE-2025-20652
Title Out-of-bounds read in DA
Severity Medium
Vulnerability Type ID
CWE CWE-125 Out-of-bounds Read
Description In V5 DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation.
Affected Chipsets MT6580, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8167S, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8893
Affected Software Versions Android 13.0, 14.0, 15.0
Report Source Internal

CVE CVE-2025-20653
Title Integer overflow in DA
Severity Medium
Vulnerability Type ID
CWE CWE-190 Integer Overflow
Description In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation.
Affected Chipsets MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6895, MT6897, MT6983, MT6985, MT6989, MT8370, MT8390
Affected Software Versions Android 13.0, 14.0, 15.0
Report Source Internal


Vulnerability Type Definition

Abbreviation Definition
RCE Remote Code Execution
EoP Elevation of Privilege
ID Information Disclosure
DoS Denial of Service
N/A Classification not available


Versions

Version Date Description
1.0 March 3, 2025 Bulletin published.


Notes

Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.

If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.