Vulnerability Description
In vdec, there is a possible permission bypass due to improper input validation. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09486425; Issue ID: MSV-2609.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 12.0 | |
| Mediatek | Mt6765 | - |
| Mediatek | Mt6768 | - |
| Mediatek | Mt6781 | - |
| Mediatek | Mt6789 | - |
| Mediatek | Mt6833 | - |
| Mediatek | Mt6853 | - |
| Mediatek | Mt6877 | - |
| Mediatek | Mt6885 | - |
| Mediatek | Mt8768 | - |
| Mediatek | Mt8771 | - |
| Mediatek | Mt8781 | - |
| Mediatek | Mt8786 | - |
| Mediatek | Mt8791T | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-20657?
CVE-2025-20657 is a vulnerability with a CVSS score of 6.7 (MEDIUM). In vdec, there is a possible permission bypass due to improper input validation. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User i...
How severe is CVE-2025-20657?
CVE-2025-20657 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-20657?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android, Mediatek Mt6765, Mediatek Mt6768, Mediatek Mt6781, Mediatek Mt6789.