First published: Mon Apr 07 2025(Updated: )
In DA, there is a possible permission bypass due to a logic error. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09474894; Issue ID: MSV-2597.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Android | =12.0 | |
Android | =13.0 | |
Android | =14.0 | |
Android | =15.0 | |
Any of | ||
Mediatek MT2718 | ||
MediaTek MT6781 | ||
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6878 | ||
MediaTek MT6879 | ||
MediaTek MT6886 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
Mediatek MT8196 | ||
MediaTek MT8673 | ||
MediaTek MT8676 | ||
MediaTek MT8678 | ||
MediaTek MT8781 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20658 is classified as a moderate severity vulnerability due to potential privilege escalation risks.
To resolve CVE-2025-20658, apply the latest patch identified as ALPS09474894 provided by the vendor.
CVE-2025-20658 is caused by a logic error that allows for a permission bypass.
CVE-2025-20658 affects devices running specific versions of Android and various MediaTek chipsets.
No, user interaction is not required for exploiting CVE-2025-20658, making it a higher risk issue.