In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010441; Issue ID: MSV-3967.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/November-2025 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
05 Nov 2025, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Mediatek mt6897
Mediatek mt8893 Mediatek mt2718 Linuxfoundation Openwrt Mediatek mt6986d Mediatek mt6899 Rdkcentral rdk-b Mediatek mt6982 Mediatek mt8755 Mediatek mt2737 Mediatek mt6835 Mediatek mt6878 Mediatek mt6989 Mediatek mt6985 Mediatek mt6991 Rdkcentral Mediatek mt6986 Google android Zephyrproject Mediatek mt6886 Mediatek mt6990 Mediatek mt8676 Mediatek mt8678 Openwrt openwrt Linuxfoundation yocto Zephyrproject zephyr Mediatek |
|
| References | () https://corp.mediatek.com/product-security-bulletin/November-2025 - Vendor Advisory | |
| CWE | CWE-787 | |
| CPE | cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6982:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:* |
04 Nov 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
04 Nov 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-04 07:15
Updated : 2025-11-05 17:11
NVD link : CVE-2025-20746
Mitre link : CVE-2025-20746
CVE.ORG link : CVE-2025-20746
JSON object : View
Products Affected
mediatek
- mt8678
- mt2737
- mt8676
- mt8893
- mt6986d
- mt6899
- mt6897
- mt6982
- mt6878
- mt6991
- mt6835
- mt2718
- mt8755
- mt6886
- mt6986
- mt6990
- mt6985
- mt6989
linuxfoundation
- yocto
rdkcentral
- rdk-b
zephyrproject
- zephyr
openwrt
- openwrt
- android
