CVE-2025-20645
Published: 03 March 2025
Summary
CVE-2025-20645 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 14.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation of identified flaws directly addresses the missing bounds check in KeyInstall via application of the provided patch.
Memory protection mechanisms prevent successful exploitation of the out-of-bounds write for local privilege escalation even from System privilege.
Input validation with bounds checking on data processed by KeyInstall mitigates the root cause of the out-of-bounds write vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local out-of-bounds write enabling privilege escalation from System context via arbitrary code execution.
NVD Description
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for…
more
exploitation. Patch ID: ALPS09475476; Issue ID: MSV-2599.
Deeper analysisAI
CVE-2025-20645 is a vulnerability in the KeyInstall component that enables an out-of-bounds write due to a missing bounds check, classified under CWE-787. This issue affects MediaTek products, as documented in their March 2025 product security bulletin. The vulnerability was published on 2025-03-03 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact potential from a local attack vector.
A malicious local actor who has already obtained System privilege can exploit this flaw to achieve further local escalation of privilege. Exploitation requires low attack complexity and no user interaction, allowing the attacker to potentially gain high confidentiality, integrity, and availability impacts through arbitrary code execution or system compromise.
MediaTek's advisory provides mitigation through Patch ID ALPS09475476 (Issue ID MSV-2599). Security practitioners should consult the full details at https://corp.mediatek.com/product-security-bulletin/March-2025 and apply the patch to vulnerable devices.
Details
- CWE(s)