June 2025 Product Security Bulletin

Published 2025-06-02
The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT, Computer Vision, Audio, and TV chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.

The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).


Summary

Severity CVEs
High CVE-2025-20672
Medium CVE-2025-20673, CVE-2025-20674, CVE-2025-20675, CVE-2025-20676, CVE-2025-20677, CVE-2025-20678


Details

CVE CVE-2025-20672
Title Heap overflow in Bluetooth
Severity High
Vulnerability Type EoP
CWE CWE-122 Heap Overflow
Description In Bluetooth driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT7902, MT7921, MT7922, MT7925, MT7927
Affected Software Versions NB SDK release 3.6 and before
Report Source External

CVE CVE-2025-20673
Title Null pointer dereference in wlan
Severity Medium
Vulnerability Type DoS
CWE CWE-476 NULL Pointer Dereference
Description In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT7902, MT7921, MT7922, MT7925, MT7927
Affected Software Versions NB SDK release 3.6 and before
Report Source External

CVE CVE-2025-20674
Title Incorrect authorization in wlan
Severity Medium
Vulnerability Type EoP
CWE CWE-863 Incorrect Authorization
Description In wlan AP driver, there is a possible way to inject arbitrary packet due to a missing permission check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6890, MT6990, MT7915, MT7916, MT7981, MT7986, MT7990, MT7992, MT7993
Affected Software Versions SDK release 7.6.7.2 and before / OpenWrt 19.07, 21.02 (MT6890) / OpenWrt 21.02, 23.05 (MT6990)
Report Source External

CVE CVE-2025-20675
Title Null pointer dereference in wlan
Severity Medium
Vulnerability Type DoS
CWE CWE-476 NULL Pointer Dereference
Description In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT7902, MT7921, MT7922, MT7925, MT7927
Affected Software Versions NB SDK release 3.6 and before
Report Source External

CVE CVE-2025-20676
Title Null pointer dereference in wlan
Severity Medium
Vulnerability Type DoS
CWE CWE-476 NULL Pointer Dereference
Description In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT7902, MT7921, MT7922, MT7925, MT7927
Affected Software Versions NB SDK release 3.6 and before
Report Source External

CVE CVE-2025-20677
Title Null pointer dereference in Bluetooth
Severity Medium
Vulnerability Type DoS
CWE CWE-476 NULL Pointer Dereference
Description In Bluetooth driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT7902, MT7921, MT7922, MT7925, MT7927
Affected Software Versions NB SDK release 3.6 and before
Report Source External

CVE CVE-2025-20678
Title Uncontrolled recursion in ims service
Severity Medium
Vulnerability Type DoS
CWE CWE-674 Uncontrolled Recursion
Description In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected Chipsets MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Affected Software Versions Modem LR12A, LR13, NR15, NR16, NR17, NR17R
Report Source Internal


Vulnerability Type Definition

Abbreviation Definition
RCE Remote Code Execution
EoP Elevation of Privilege
ID Information Disclosure
DoS Denial of Service
N/A Classification not available


Versions

Version Date Description
1.0 June 2, 2025 Bulletin published.


Notes

Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.

If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.