Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 30 Mar 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-415 |
Mon, 12 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-415 |
Thu, 08 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:* |
|
| Vendors & Products |
Google
Google android |
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mediatek
Mediatek mt6878 Mediatek mt6897 Mediatek mt6899 Mediatek mt6985 Mediatek mt6989 Mediatek mt6991 Mediatek mt6993 Mediatek mt8792 Mediatek mt8796 Mediatek mt8798 |
|
| Vendors & Products |
Mediatek
Mediatek mt6878 Mediatek mt6897 Mediatek mt6899 Mediatek mt6985 Mediatek mt6989 Mediatek mt6991 Mediatek mt6993 Mediatek mt8792 Mediatek mt8796 Mediatek mt8798 |
Tue, 06 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In seninf, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10251210; Issue ID: MSV-4926. | |
| Weaknesses | CWE-415 | |
| References |
|
Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2026-03-30T13:04:21.657Z
Reserved: 2024-11-01T01:21:50.406Z
Link: CVE-2025-20801
Updated: 2026-01-06T14:21:00.635Z
Status : Modified
Published: 2026-01-06T02:15:44.190
Modified: 2026-03-30T12:16:25.333
Link: CVE-2025-20801
No data.
OpenCVE Enrichment
Updated: 2026-01-06T14:16:07Z