In gnss service, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10010443; Issue ID: MSV-3966.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/November-2025 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
05 Nov 2025, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-787 | |
| First Time |
Linuxfoundation yocto
Zephyrproject zephyr Mediatek mt6986 Google android Linuxfoundation Mediatek mt8676 Mediatek mt2718 Mediatek mt8893 Mediatek mt6897 Mediatek mt6985 Mediatek Mediatek mt6982 Mediatek mt6878 Mediatek mt6835 Mediatek mt6990 Mediatek mt6899 Mediatek mt2737 Openwrt openwrt Mediatek mt8678 Mediatek mt6991 Mediatek mt8755 Zephyrproject Rdkcentral Rdkcentral rdk-b Openwrt Mediatek mt6986d Mediatek mt6886 Mediatek mt6989 |
|
| References | () https://corp.mediatek.com/product-security-bulletin/November-2025 - Vendor Advisory | |
| CPE | cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6986d:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6986:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6982:-:*:*:*:*:*:*:* cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:* |
04 Nov 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
04 Nov 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-04 07:15
Updated : 2025-11-05 17:11
NVD link : CVE-2025-20747
Mitre link : CVE-2025-20747
CVE.ORG link : CVE-2025-20747
JSON object : View
Products Affected
mediatek
- mt6886
- mt6986d
- mt6899
- mt6878
- mt8678
- mt8893
- mt8755
- mt6835
- mt2718
- mt6986
- mt6990
- mt8676
- mt6897
- mt6989
- mt6985
- mt6982
- mt2737
- mt6991
zephyrproject
- zephyr
rdkcentral
- rdk-b
- android
openwrt
- openwrt
linuxfoundation
- yocto
