CVE-2025-20795
Published: 06 January 2026
Summary
CVE-2025-20795 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of inputs including bounds checks to prevent the out-of-bounds write due to missing bounds check in KeyInstall.
Implements memory protection mechanisms such as guard pages and execution prevention to mitigate exploitation of the out-of-bounds write vulnerability.
Mandates identification, reporting, and correction of the specific flaw causing the missing bounds check, enabling patching as provided by MediaTek (ALPS10276761).
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds write in local KeyInstall component directly enables local privilege escalation from an already-obtained lower-privileged context.
NVD Description
In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for…
more
exploitation. Patch ID: ALPS10276761; Issue ID: MSV-5141.
Deeper analysisAI
CVE-2025-20795 is a vulnerability in the KeyInstall component that enables an out-of-bounds write due to a missing bounds check. Published on 2026-01-06, it is tracked under CWE-787 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The issue affects MediaTek products, as detailed in their product security bulletin.
A local attacker with low privileges, specifically one who has already obtained System privilege, can exploit this vulnerability to achieve local escalation of privilege. Exploitation requires no user interaction and has low complexity, potentially granting high confidentiality, integrity, and availability impacts.
MediaTek's January 2026 product security bulletin provides mitigation details, including Patch ID ALPS10276761 for addressing Issue ID MSV-5141. Security practitioners should apply the referenced patch to vulnerable systems.
Details
- CWE(s)