The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT, Computer Vision, Audio, and TV chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
Summary
Severity | CVEs |
---|---|
High | CVE-2025-20644, CVE-2025-20645, CVE-2025-20646 |
Medium | CVE-2025-20647, CVE-2025-20648, CVE-2025-20649, CVE-2025-20650, CVE-2025-20651, CVE-2025-20652, CVE-2025-20653 |
Details
CVE | CVE-2025-20644 |
---|---|
Title | Syntactic correctness in Modem |
Severity | High |
Vulnerability Type | DoS |
CWE | CWE-1286 Syntactic Correctness |
Description | In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798 |
Affected Software Versions | Modem NR15, NR16 |
Report Source | External |
CVE | CVE-2025-20645 |
---|---|
Title | Out-of-bounds write in KeyInstall |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. |
Affected Chipsets | MT6765, MT6768, MT6833, MT6835, MT6853, MT6855, MT6879, MT6886, MT6893, MT6897, MT6983, MT6985, MT6989, MT8796 |
Affected Software Versions | Android 14.0, 15.0 |
Report Source | Internal |
CVE | CVE-2025-20646 |
---|---|
Title | Out-of-bounds write in wlan |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In wlan AP FW, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6890, MT7915, MT7916, MT7981, MT7986 |
Affected Software Versions | SDK release 7.6.7.2 and before |
Report Source | Internal |
CVE | CVE-2025-20647 |
---|---|
Title | Null pointer dereference in Modem |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-476 NULL Pointer Dereference |
Description | In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798 |
Affected Software Versions | Modem NR12A, NR13, NR15, NR16 |
Report Source | External |
CVE | CVE-2025-20648 |
---|---|
Title | Out-of-bounds read in apu |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-125 Out-of-bounds Read |
Description | In apu, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2718, MT6879, MT6989, MT8196, MT8370, MT8390, MT8395, MT8673, MT8678 |
Affected Software Versions | Android 13.0, 14.0, 15.0 |
Report Source | External |
CVE | CVE-2025-20649 |
---|---|
Title | Improper handling of insufficient permissions or privileges in Bluetooth |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-280 Improper Handling of Insufficient Permissions or Privileges |
Description | In Bluetooth Stack SW, there is a possible information disclosure due to a missing permission check. This could lead to remote (proximal/adjacent) information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6880, MT6890, MT6980, MT6990, MT7663, MT7902, MT7925, MT7927, MT7961 |
Affected Software Versions | SDK release 3.6 and before / openWRT 23.05 |
Report Source | Internal |
CVE | CVE-2025-20650 |
---|---|
Title | Out-of-bounds write in DA |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678 |
Affected Software Versions | Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 |
Report Source | Internal |
CVE | CVE-2025-20651 |
---|---|
Title | Out-of-bounds read in DA |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-125 Out-of-bounds Read |
Description | In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676, MT8678 |
Affected Software Versions | Android 13.0, 14.0, 15.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 |
Report Source | Internal |
CVE | CVE-2025-20652 |
---|---|
Title | Out-of-bounds read in DA |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-125 Out-of-bounds Read |
Description | In V5 DA, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT6580, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8167S, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8893 |
Affected Software Versions | Android 13.0, 14.0, 15.0 |
Report Source | Internal |
CVE | CVE-2025-20653 |
---|---|
Title | Integer overflow in DA |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-190 Integer Overflow |
Description | In da, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6886, MT6895, MT6897, MT6983, MT6985, MT6989, MT8370, MT8390 |
Affected Software Versions | Android 13.0, 14.0, 15.0 |
Report Source | Internal |
Vulnerability Type Definition
Abbreviation | Definition |
---|---|
RCE | Remote Code Execution |
EoP | Elevation of Privilege |
ID | Information Disclosure |
DoS | Denial of Service |
N/A | Classification not available |
Versions
Version | Date | Description |
1.0 | March 3, 2025 | Bulletin published. |
Notes
Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.