CVE-2025-20638
Feb. 3, 2025, 7:40 p.m.
4.3
Medium
Description
In DA, there is a possible read of uninitialized heap data due to uninitialized data. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09291449; Issue ID: MSV-2066.
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
|
|
|
Mediatek |
|
|
Weaknesses
CWE-457
Use of Uninitialized Variable
The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
CWE-908
Use of Uninitialized Resource
The product uses or accesses a resource that has not been initialized.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
o | android | 12.0 | / | / | / | / | / | / | / | |
o | android | 13.0 | / | / | / | / | / | / | / | |
o | android | 14.0 | / | / | / | / | / | / | / | |
o | android | 15.0 | / | / | / | / | / | / | / | |
h | mediatek | mt6739 | - | / | / | / | / | / | / | / |
h | mediatek | mt6761 | - | / | / | / | / | / | / | / |
h | mediatek | mt6765 | - | / | / | / | / | / | / | / |
h | mediatek | mt6768 | - | / | / | / | / | / | / | / |
h | mediatek | mt6771 | - | / | / | / | / | / | / | / |
h | mediatek | mt6779 | - | / | / | / | / | / | / | / |
h | mediatek | mt6781 | - | / | / | / | / | / | / | / |
h | mediatek | mt6785 | - | / | / | / | / | / | / | / |
h | mediatek | mt6833 | - | / | / | / | / | / | / | / |
h | mediatek | mt6853 | - | / | / | / | / | / | / | / |
h | mediatek | mt6873 | - | / | / | / | / | / | / | / |
h | mediatek | mt6877 | - | / | / | / | / | / | / | / |
h | mediatek | mt6885 | - | / | / | / | / | / | / | / |
h | mediatek | mt6893 | - | / | / | / | / | / | / | / |
h | mediatek | mt8167 | - | / | / | / | / | / | / | / |
h | mediatek | mt8167s | - | / | / | / | / | / | / | / |
h | mediatek | mt8175 | - | / | / | / | / | / | / | / |
h | mediatek | mt8185 | - | / | / | / | / | / | / | / |
h | mediatek | mt8195 | - | / | / | / | / | / | / | / |
h | mediatek | mt8321 | - | / | / | / | / | / | / | / |
h | mediatek | mt8362a | - | / | / | / | / | / | / | / |
h | mediatek | mt8365 | - | / | / | / | / | / | / | / |
h | mediatek | mt8385 | - | / | / | / | / | / | / | / |
h | mediatek | mt8395 | - | / | / | / | / | / | / | / |
h | mediatek | mt8666 | - | / | / | / | / | / | / | / |
h | mediatek | mt8667 | - | / | / | / | / | / | / | / |
h | mediatek | mt8673 | - | / | / | / | / | / | / | / |
h | mediatek | mt8675 | - | / | / | / | / | / | / | / |
h | mediatek | mt8678 | - | / | / | / | / | / | / | / |
h | mediatek | mt8765 | - | / | / | / | / | / | / | / |
h | mediatek | mt8766 | - | / | / | / | / | / | / | / |
h | mediatek | mt8768 | - | / | / | / | / | / | / | / |
h | mediatek | mt8771 | - | / | / | / | / | / | / | / |
h | mediatek | mt8775 | - | / | / | / | / | / | / | / |
h | mediatek | mt8781 | - | / | / | / | / | / | / | / |
h | mediatek | mt8786 | - | / | / | / | / | / | / | / |
h | mediatek | mt8788 | - | / | / | / | / | / | / | / |
h | mediatek | mt8789 | - | / | / | / | / | / | / | / |
h | mediatek | mt8791t | - | / | / | / | / | / | / | / |
h | mediatek | mt8795t | - | / | / | / | / | / | / | / |
h | mediatek | mt8797 | - | / | / | / | / | / | / | / |
h | mediatek | mt8798 | - | / | / | / | / | / | / | / |
h | mediatek | mt8893 | - | / | / | / | / | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: PHYSICAL
- Attack Complexity: LOW
- Privileges Required: NONE
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: NONE
- Availability Impact: NONE
View Vector String
CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Date
- Published: Feb. 3, 2025, 4:15 a.m.
- Last Modified: Feb. 3, 2025, 7:40 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
security@mediatek.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.