CVE-2025-20800
Published: 06 January 2026
Summary
CVE-2025-20800 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and patching of the out-of-bounds write vulnerability in mminfra as specified by Patch ID ALPS10267349.
Implements memory safeguards such as DEP and ASLR to prevent exploitation of the missing bounds check leading to out-of-bounds write and privilege escalation.
Mandates validation of inputs to the mminfra component to enforce bounds checking and avert the out-of-bounds write vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local OOB write memory corruption vulnerability directly enables exploitation for privilege escalation from an already-privileged local process to higher privileges via arbitrary code execution.
NVD Description
In mminfra, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for…
more
exploitation. Patch ID: ALPS10267349; Issue ID: MSV-5033.
Deeper analysisAI
CVE-2025-20800 is a vulnerability in the mminfra component that enables an out-of-bounds write due to a missing bounds check, corresponding to CWE-787. It affects MediaTek products, as indicated by the associated patch and issue tracking. The issue has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H), highlighting high impacts on confidentiality, integrity, and availability.
A local attacker who has already obtained System privileges can exploit this vulnerability to achieve escalation of privilege. No user interaction is required, and the low attack complexity combined with low privileges prerequisite makes it feasible for a compromised process at that level to trigger the out-of-bounds write, potentially allowing arbitrary code execution or further system compromise.
MediaTek's January 2026 product security bulletin provides details on mitigation, including Patch ID ALPS10267349 and Issue ID MSV-5033, which security practitioners should apply to vulnerable devices.
Details
- CWE(s)