The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-20774

CVE-2025-20774: Android Display Privilege Escalation Flaw

CVE-2025-20774 is a privilege escalation vulnerability in Google Android's display component caused by an out of bounds write. Attackers with System privileges can exploit this flaw without user interaction to gain elevated access.

Updated: January 22, 2026

CVE-2025-20774 Overview

CVE-2025-20774 is a medium-severity out-of-bounds write vulnerability affecting the display driver component in MediaTek chipsets running Google Android. The vulnerability exists due to a missing bounds check in the display subsystem, which could allow an attacker who has already obtained System-level privileges to escalate their access further. Notably, no user interaction is required for exploitation, making this vulnerability particularly concerning for compromised devices.

This vulnerability is classified under CWE-787 (Out-of-Bounds Write) and CWE-122 (Heap-based Buffer Overflow), indicating a memory corruption issue in the display driver that could lead to arbitrary memory writes beyond allocated buffer boundaries.

Critical Impact

Local privilege escalation on Android devices with MediaTek chipsets. An attacker with System privileges can achieve full device compromise through memory corruption in the display driver.

Affected Products

  • Google Android 14.0, 15.0, and 16.0
  • MediaTek MT6739, MT6761, MT6765, MT6768, MT6781, MT6789
  • MediaTek MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879
  • MediaTek MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899
  • MediaTek MT6983, MT6985, MT6989, MT6991
  • MediaTek MT2718, MT8196, MT8676, MT8678, MT8792, MT8793

Discovery Timeline

  • December 2, 2025 - CVE-2025-20774 published to NVD
  • December 3, 2025 - Last updated in NVD database

Technical Details for CVE-2025-20774

Vulnerability Analysis

The vulnerability resides in the display driver component of MediaTek chipsets used across numerous Android devices. According to the CVSS:3.1 vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, this vulnerability has a base score of 6.7 (Medium severity) and requires:

  • Attack Vector: Local access to the device
  • Attack Complexity: Low - exploitation is straightforward once prerequisites are met
  • Privileges Required: High - attacker must already have System-level privileges
  • User Interaction: None required
  • Impact: High confidentiality, integrity, and availability impact

The vulnerability is tracked internally by MediaTek as Patch ID ALPS10196993 and Issue ID MSV-4796.

Root Cause

The root cause of CVE-2025-20774 is a missing bounds check in the display driver subsystem. When processing display-related operations, the driver fails to properly validate input parameters or buffer sizes before performing write operations. This oversight allows data to be written beyond the boundaries of allocated memory buffers, resulting in heap-based buffer overflow conditions.

The absence of proper input validation in the display component creates a scenario where malformed or specially crafted requests can trigger memory corruption, potentially overwriting adjacent memory structures critical to system operation and security.

Attack Vector

The attack vector for CVE-2025-20774 is local, meaning an attacker must have existing access to the target device. The exploitation scenario involves:

  1. An attacker first gains System-level privileges on the Android device through another vulnerability or malicious application
  2. The attacker then interacts with the vulnerable display driver component
  3. By sending specially crafted requests to the display subsystem, the attacker triggers the out-of-bounds write condition
  4. The memory corruption can be leveraged to achieve further privilege escalation or arbitrary code execution at the kernel level

Since user interaction is not required, an automated exploit could be triggered once the initial System privilege requirement is satisfied. The Exploit Prediction Scoring System (EPSS) indicates a probability of 0.005% (24.3rd percentile), suggesting relatively low likelihood of active exploitation in the wild.

Detection Methods for CVE-2025-20774

Indicators of Compromise

  • Unusual crashes or instability in the display subsystem or Android system_server process
  • Unexpected privilege escalation events from System-level processes
  • Anomalous memory access patterns in kernel logs related to display driver operations
  • Signs of kernel memory corruption or panic events related to the MediaTek display component

Detection Strategies

Organizations and security teams should implement the following detection strategies:

Log Analysis: Monitor Android system logs for crashes or exceptions related to the display driver component, particularly those indicating memory corruption or invalid memory access.

Behavioral Monitoring: Deploy endpoint detection solutions capable of identifying privilege escalation attempts and anomalous system behavior on Android devices with MediaTek chipsets.

Kernel Integrity Monitoring: Implement solutions that monitor kernel memory integrity and can detect unauthorized modifications to kernel structures.

Mobile Device Management (MDM): Use MDM solutions to monitor device health, detect root/jailbreak status, and identify devices running vulnerable Android versions.

Monitoring Recommendations

Security teams managing Android device fleets should:

  1. Establish baseline behavior profiles for managed devices to identify deviations
  2. Enable detailed logging for system-level processes on critical devices
  3. Monitor for applications requesting or operating with System-level privileges
  4. Implement network-based detection for potential command-and-control traffic from compromised devices
  5. Use SentinelOne Mobile Threat Defense to provide real-time protection and visibility into mobile device security posture

How to Mitigate CVE-2025-20774

Immediate Actions Required

  • Apply the MediaTek security patch ALPS10196993 immediately when available through OEM updates
  • Review and audit applications running with elevated privileges on affected devices
  • Implement application allowlisting to prevent unauthorized applications from executing
  • Enable additional security features such as Android Verified Boot and SELinux in enforcing mode
  • Monitor affected devices for signs of compromise until patches can be applied

Patch Information

MediaTek has released a security patch addressing this vulnerability as documented in their December 2025 Product Security Bulletin. The patch is identified as ALPS10196993 and resolves the missing bounds check in the display driver component.

Device manufacturers and OEMs should integrate this patch into their Android builds. End users should install security updates provided by their device manufacturers as they become available. Google Android versions 14.0, 15.0, and 16.0 running on affected MediaTek chipsets require this update.

For detailed patch information, refer to the MediaTek Product Security Bulletin - December 2025.

Workarounds

While no official workarounds have been published by MediaTek, organizations can implement the following risk reduction measures until patches are applied:

Principle of Least Privilege: Minimize applications and services running with System or elevated privileges. Audit and remove unnecessary privileged applications.

Network Isolation: Limit network access for potentially vulnerable devices to reduce the attack surface for initial compromise vectors.

Device Hardening: Ensure devices are running with all security features enabled, including SELinux, verified boot, and encryption.

Monitoring Enhancement: Increase monitoring and logging on affected devices to detect potential exploitation attempts.

bash
# Check Android security patch level on affected devices
adb shell getprop ro.build.version.security_patch

# Verify SELinux is in enforcing mode
adb shell getenforce

# List applications with system privileges for audit
adb shell pm list packages -f | grep -i system

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechGoogle Android

  • SeverityMEDIUM

  • CVSS Score6.7

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-122

  • CWE-787
  • Vendor Resources
  • Vendor Advisory
  • Related CVEs
  • CVE-2025-36920: Google Android Privilege Escalation Flaw

  • CVE-2026-0107: Google Android Privilege Escalation Flaw

  • CVE-2026-0110: Google Android Privilege Escalation Flaw

  • CVE-2026-0111: Google Android Privilege Escalation Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English