Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction

Posted on June 2, 2025June 2, 2025 By CWS

A number of crucial safety vulnerabilities affecting MediaTek smartphones, tablets, and IoT chipsets may permit attackers to escalate privileges and compromise system safety with out requiring any consumer interplay.

The Taiwan-based chipset producer printed its June 2025 Product Safety Bulletin, revealing seven Widespread Vulnerabilities and Exposures (CVEs) with severity rankings from excessive to medium severity, in accordance with CVSS v3.1.

Gadget producers have been notified of those safety flaws and supplied with corresponding patches no less than two months previous to public disclosure.

Excessive Severity Bluetooth Vulnerability 

Probably the most extreme vulnerability recognized is CVE-2025-20672, categorised as a high-severity Elevation of Privilege (EoP) flaw affecting Bluetooth drivers throughout a number of MediaTek chipsets. 

This vulnerability stems from a heap overflow situation categorized beneath CWE-122 Heap Overflow, the place an incorrect bounds verify within the Bluetooth driver creates the chance for out-of-bounds write operations.

The technical implementation of this vulnerability allows attackers to realize native privilege escalation with solely consumer execution privileges required, making it notably harmful since no consumer interplay is important for profitable exploitation. 

The affected chipsets embody MT7902, MT7921, MT7922, MT7925, and MT7927, all operating NB SDK launch 3.6 and earlier variations. 

This vulnerability was found by way of exterior safety analysis, highlighting the significance of third-party safety assessments in figuring out crucial flaws.

Medium Severity WLAN and Community Points

5 medium-severity vulnerabilities have been recognized throughout WLAN and community companies, presenting varied assault vectors for malicious actors. 

CVE-2025-20673, CVE-2025-20675, and CVE-2025-20676 all contain NULL pointer dereference points categorised beneath CWE-476, affecting WLAN STA drivers on the identical chipset household because the Bluetooth vulnerability, reads the MediaTek advisory.

These Denial of Service (DoS) vulnerabilities may result in system crashes resulting from uncaught exceptions, requiring consumer execution privileges however no consumer interplay.

CVE-2025-20674 presents a very regarding distant assault vector by way of incorrect authorization in WLAN AP drivers, categorized beneath CWE-863, Incorrect Authorization. 

This vulnerability impacts a broader vary of chipsets, together with MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, and MT7993, probably permitting attackers to inject arbitrary packets resulting from lacking permission checks. 

The vulnerability allows distant privilege escalation with out extra execution privileges, affecting gadgets operating SDK launch 7.6.7.2 and earlier, in addition to particular OpenWrt variations.

CVE-2025-20677 impacts Bluetooth drivers with one other NULL pointer dereference subject, whereas CVE-2025-20678 entails uncontrolled recursion in IMS companies, categorised beneath CWE-674 Uncontrolled Recursion.

The scope of those vulnerabilities extends far past particular person gadgets, with CVE-2025-20678 alone affecting over 80 totally different MediaTek chipsets spanning from MT6739 to MT8893 sequence. 

This in depth chipset protection consists of standard smartphone processors, pill chipsets, and IoT-focused silicon used throughout quite a few system classes, together with Good TVs, Laptop Imaginative and prescient methods, and Audio platforms.

The IMS service vulnerability is especially regarding because it allows distant denial of service assaults when a tool connects to a rogue base station managed by an attacker, requiring no extra execution privileges or consumer interplay. 

Affected software program variations embody Modem LR12A, LR13, NR15, NR16, NR17, and NR17R, indicating the vulnerability spans a number of generations of MediaTek’s modem implementations.

Gadget producers and customers should prioritize making use of accessible safety patches to mitigate these vulnerabilities, notably given their potential for exploitation with out consumer consciousness or interplay.

Stay Credential Theft Assault Unmask & Prompt Protection – Free Webinar

Cyber Security News Tags:Attackers, Escalate, Interaction, MediaTek, Privileges, User, Vulnerabilities

Post navigation

Previous Post: Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
Next Post: Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Related Posts

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cyber Security News
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News
Threat Actors Impersonate Fake Docusign Notifications To Steal Corporate Data Cyber Security News
Critical Adobe Illustrator Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News