In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 09 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Google Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt6781 Mediatek mt6789 Mediatek mt6835 Mediatek mt6855 Mediatek mt6878 Mediatek mt6879 Mediatek mt6886 Mediatek mt6895 Mediatek mt6897 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt6990 Mediatek mt8196 Mediatek mt8370 Mediatek mt8390 Openwrt Openwrt openwrt Rdkcentral Rdkcentral rdk-b | |
| CPEs | cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:* | |
| Vendors & Products | Google Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt6781 Mediatek mt6789 Mediatek mt6835 Mediatek mt6855 Mediatek mt6878 Mediatek mt6879 Mediatek mt6886 Mediatek mt6895 Mediatek mt6897 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt6990 Mediatek mt8196 Mediatek mt8370 Mediatek mt8390 Openwrt Openwrt openwrt Rdkcentral Rdkcentral rdk-b | 
Tue, 08 Apr 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 07 Apr 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | cvssV3_1 
 | 
Mon, 07 Apr 2025 03:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09625423; Issue ID: MSV-3033. | |
| Weaknesses | CWE-787 | |
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: MediaTek
Published: 2025-04-07T03:14:49.018Z
Updated: 2025-04-07T13:57:13.648Z
Reserved: 2024-11-01T01:21:50.367Z
Link: CVE-2025-20656
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-04-07T13:56:59.145Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-04-07T04:15:19.447
Modified: 2025-04-09T15:29:43.380
Link: CVE-2025-20656
 Redhat
                        Redhat
                    No data.