First published: Mon Apr 07 2025(Updated: )
In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =4.0 | |
RDK Central RDKB | =2024q1 | |
Android | =12.0 | |
Android | =13.0 | |
Android | =14.0 | |
Android | =15.0 | |
Open edX | =21.02.0 | |
Open edX | =23.05 | |
Any of | ||
MediaTek MT6781 | ||
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6878 | ||
MediaTek MT6879 | ||
MediaTek MT6886 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
MediaTek MT6990 | ||
Mediatek MT8196 | ||
MediaTek MT8370 | ||
MediaTek MT8390 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20656 is classified as a high severity vulnerability due to its potential for local escalation of privilege.
To fix CVE-2025-20656, apply the patch identified as ALPS09625423 as soon as possible.
CVE-2025-20656 affects devices running specified versions of Yocto, Android, OpenWRT, and certain MediaTek chipsets.
CVE-2025-20656 is an out-of-bounds write vulnerability due to a missing bounds check.
No, user interaction is not needed to exploit CVE-2025-20656, making it particularly dangerous.