Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cursor AI Code Editor Mounted Flaw Permitting Attackers to Run Instructions by way of Immediate Injection

    August 2, 2025

    Wordle at present: The reply and hints for August 2, 2025

    August 2, 2025

    Debugging and Tracing LLMs Like a Professional

    August 2, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Vital MediaTek Flaws Permit Hackers to Achieve Elevated Entry with No Consumer Enter
    AI Ethics & Regulation

    Vital MediaTek Flaws Permit Hackers to Achieve Elevated Entry with No Consumer Enter

    Declan MurphyBy Declan MurphyJune 2, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Vital MediaTek Flaws Permit Hackers to Achieve Elevated Entry with No Consumer Enter
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    MediaTek has revealed its newest Product Safety Bulletin, revealing a number of safety vulnerabilities affecting a variety of its chipsets utilized in smartphones, tablets, AIoT gadgets, sensible shows, sensible platforms, OTT gadgets, pc imaginative and prescient methods, audio tools, and TVs.

    Machine OEMs had been notified of those points and supplied with corresponding safety patches at the very least two months earlier than the general public disclosure, consistent with business greatest practices.

    Severity Evaluation and Technical Overview

    The evaluation of those vulnerabilities was carried out utilizing the Frequent Vulnerability Scoring System model 3.1 (CVSS v3.1), which is extensively adopted for evaluating the severity of software program vulnerabilities.

    – Commercial –

    The bulletin identifies one high-severity vulnerability (CVE-2025-20672) and 6 medium-severity vulnerabilities (CVE-2025-20673 by means of CVE-2025-20678).

    The vulnerabilities span a number of technical classes, together with:

    • Elevation of Privilege (EoP): Permits attackers to realize unauthorized entry or privileges.
    • Denial of Service (DoS): Allows attackers to disrupt regular functioning, resulting in system crashes.
    • CWE-122 Heap Overflow: A important concern the place improper bounds checking permits writing outdoors the allotted reminiscence, doubtlessly resulting in privilege escalation.
    • CWE-476 NULL Pointer Dereference: Happens when a program makes an attempt to make use of a null pointer, resulting in crashes or denial of service.
    • CWE-863 Incorrect Authorization: Entails lacking permission checks, doubtlessly permitting unauthorized actions.
    • CWE-674 Uncontrolled Recursion: Extreme recursive calls may cause stack overflows and repair disruptions.

    Detailed Vulnerability Breakdown

    The next desk summarizes the reported vulnerabilities, their technical nature, and affected chipsets:

    CVE Title Severity Vulnerability Kind CWE Code Affected Chipsets Affected Software program Variations
    CVE-2025-20672 Heap overflow in Bluetooth Excessive EoP CWE-122 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK launch 3.6 and earlier than
    CVE-2025-20673 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK launch 3.6 and earlier than
    CVE-2025-20674 Incorrect authorization in wlan Medium EoP CWE-863 MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993 SDK launch 7.6.7.2 and earlier than / OpenWrt 19.07, 21.02 (MT6890) / OpenWrt 21.02, 23.05 (MT6990)
    CVE-2025-20675 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK launch 3.6 and earlier than
    CVE-2025-20676 Null pointer dereference in wlan Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK launch 3.6 and earlier than
    CVE-2025-20677 Null pointer dereference in Bluetooth Medium DoS CWE-476 MT7902, MT7921, MT7922, MT7925, MT7927 NB SDK launch 3.6 and earlier than
    CVE-2025-20678 Uncontrolled recursion in ims service Medium DoS CWE-674 In depth listing (e.g., MT6739, MT6761, MT6890, MT6990, and so forth.) Modem LR12A, LR13, NR15, NR16, NR17, NR17R

    Response and Business Impression

    MediaTek has proactively engaged with machine producers, making certain that patches can be found forward of public disclosure.

    The corporate emphasizes that the listing of affected chipsets will not be exhaustive and encourages OEMs to contact their MediaTek consultant for additional clarification.

    For customers and enterprises, the well timed software of safety updates stays important. MediaTek additionally invitations researchers and stakeholders to report any further vulnerabilities by means of its official channels.

    Key Technical Phrases:

    • CVE (Frequent Vulnerabilities and Exposures): Distinctive identifiers for publicly recognized cybersecurity vulnerabilities.
    • CWE (Frequent Weak spot Enumeration): Standardized classes for software program weaknesses.
    • EoP, DoS, RCE: Abbreviations for Elevation of Privilege, Denial of Service, and Distant Code Execution, respectively.

    MediaTek’s bulletin underscores the continued want for vigilance within the quickly evolving panorama of embedded and linked machine safety.

    Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Cursor AI Code Editor Mounted Flaw Permitting Attackers to Run Instructions by way of Immediate Injection

    August 2, 2025

    SafePay Ransomware Strikes 260+ Victims Throughout A number of Nations

    August 1, 2025

    Cybercrooks faked Microsoft OAuth apps for MFA phishing

    August 1, 2025
    Top Posts

    Cursor AI Code Editor Mounted Flaw Permitting Attackers to Run Instructions by way of Immediate Injection

    August 2, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Cursor AI Code Editor Mounted Flaw Permitting Attackers to Run Instructions by way of Immediate Injection

    By Declan MurphyAugust 2, 2025

    Cybersecurity researchers have disclosed a now-patched, high-severity safety flaw in Cursor, a preferred synthetic intelligence…

    Wordle at present: The reply and hints for August 2, 2025

    August 2, 2025

    Debugging and Tracing LLMs Like a Professional

    August 2, 2025

    I Examined Intellectia: Some Options Stunned Me

    August 1, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.