Monday, May 12, 2025
HomeCVE/vulnerabilityMediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

Published on

SIEM as a Service

Follow Us on Google News

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs, has released critical patches addressing several security vulnerabilities across its product portfolio.

The newly published MediaTek Product Security Bulletin details the flaws, their potential impacts, and the extensive range of affected devices.

Device manufacturers were notified of these vulnerabilities and provided security patches at least two months before the public disclosure.

- Advertisement - Google News

The security risks were assessed using the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).

CVETitleSeverityType
CVE-2025-20666Reachable assertion in ModemHighDoS
CVE-2025-20667Inadequate encryption strength in ModemMediumInfo Disclosure (ID)
CVE-2025-20671Out-of-bounds write in thermalMediumElevation of Priv.
CVE-2025-20668Out-of-bounds write in scpMediumElevation of Priv.
CVE-2025-20670Improper certificate validation in ModemMediumInfo Disclosure (ID)
CVE-2025-20665File and directory info exposure in devinfoMediumInfo Disclosure (ID)

Of particular concern is CVE-2025-20666, which may allow an attacker to trigger a remote denial-of-service simply by connecting a user device to a malicious base station.

Also notable are multiple medium-severity vulnerabilities, including encryption weaknesses and improper certificate handling that could expose sensitive information under specific conditions.

MediaTek has coordinated with OEMs to ensure patch availability ahead of disclosure, minimizing exposure risks for users.

The company recommends all device owners install the latest firmware as soon as it becomes available.

Experts advise users to:

  • Regularly update device firmware and security patches
  • Avoid connecting to unknown or suspicious networks
  • Stay alert for abnormal device behavior or connectivity issues

MediaTek’s continued transparency and prompt action demonstrate a commitment to device security.

Users are urged to stay proactive in keeping their devices secure by applying available updates and following best security practices.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability...

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...