Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MediaTek Vulnerabilities Let Attackers Escalate Privileges Without User Interaction

Posted on June 2, 2025June 2, 2025 By CWS

A number of crucial safety vulnerabilities affecting MediaTek smartphones, tablets, and IoT chipsets may permit attackers to escalate privileges and compromise system safety with out requiring any consumer interplay.

The Taiwan-based chipset producer printed its June 2025 Product Safety Bulletin, revealing seven Widespread Vulnerabilities and Exposures (CVEs) with severity rankings from excessive to medium severity, in accordance with CVSS v3.1.

Gadget producers have been notified of those safety flaws and supplied with corresponding patches no less than two months previous to public disclosure.

Excessive Severity Bluetooth Vulnerability 

Probably the most extreme vulnerability recognized is CVE-2025-20672, categorised as a high-severity Elevation of Privilege (EoP) flaw affecting Bluetooth drivers throughout a number of MediaTek chipsets. 

This vulnerability stems from a heap overflow situation categorized beneath CWE-122 Heap Overflow, the place an incorrect bounds verify within the Bluetooth driver creates the chance for out-of-bounds write operations.

The technical implementation of this vulnerability allows attackers to realize native privilege escalation with solely consumer execution privileges required, making it notably harmful since no consumer interplay is important for profitable exploitation. 

The affected chipsets embody MT7902, MT7921, MT7922, MT7925, and MT7927, all operating NB SDK launch 3.6 and earlier variations. 

This vulnerability was found by way of exterior safety analysis, highlighting the significance of third-party safety assessments in figuring out crucial flaws.

Medium Severity WLAN and Community Points

5 medium-severity vulnerabilities have been recognized throughout WLAN and community companies, presenting varied assault vectors for malicious actors. 

CVE-2025-20673, CVE-2025-20675, and CVE-2025-20676 all contain NULL pointer dereference points categorised beneath CWE-476, affecting WLAN STA drivers on the identical chipset household because the Bluetooth vulnerability, reads the MediaTek advisory.

These Denial of Service (DoS) vulnerabilities may result in system crashes resulting from uncaught exceptions, requiring consumer execution privileges however no consumer interplay.

CVE-2025-20674 presents a very regarding distant assault vector by way of incorrect authorization in WLAN AP drivers, categorized beneath CWE-863, Incorrect Authorization. 

This vulnerability impacts a broader vary of chipsets, together with MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, and MT7993, probably permitting attackers to inject arbitrary packets resulting from lacking permission checks. 

The vulnerability allows distant privilege escalation with out extra execution privileges, affecting gadgets operating SDK launch 7.6.7.2 and earlier, in addition to particular OpenWrt variations.

CVE-2025-20677 impacts Bluetooth drivers with one other NULL pointer dereference subject, whereas CVE-2025-20678 entails uncontrolled recursion in IMS companies, categorised beneath CWE-674 Uncontrolled Recursion.

The scope of those vulnerabilities extends far past particular person gadgets, with CVE-2025-20678 alone affecting over 80 totally different MediaTek chipsets spanning from MT6739 to MT8893 sequence. 

This in depth chipset protection consists of standard smartphone processors, pill chipsets, and IoT-focused silicon used throughout quite a few system classes, together with Good TVs, Laptop Imaginative and prescient methods, and Audio platforms.

The IMS service vulnerability is especially regarding because it allows distant denial of service assaults when a tool connects to a rogue base station managed by an attacker, requiring no extra execution privileges or consumer interplay. 

Affected software program variations embody Modem LR12A, LR13, NR15, NR16, NR17, and NR17R, indicating the vulnerability spans a number of generations of MediaTek’s modem implementations.

Gadget producers and customers should prioritize making use of accessible safety patches to mitigate these vulnerabilities, notably given their potential for exploitation with out consumer consciousness or interplay.

Stay Credential Theft Assault Unmask & Prompt Protection – Free Webinar

Cyber Security News Tags:Attackers, Escalate, Interaction, MediaTek, Privileges, User, Vulnerabilities

Post navigation

Previous Post: Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN
Next Post: Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection

Related Posts

UK Sanctions Russian APT 28 Hackers for Attacking Microsoft Cloud Service Login Details Cyber Security News
Scavenger Malware Hijacks Popular npm Packages to Attack Developers Cyber Security News
Behavioral Monitoring for Real-Time Endpoint Threat Detection Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News
Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News