MediaTek July 2025 Security Update Addresses Multiple Chipset Vulnerabilities

MediaTek July 2025 Security Update Addresses Multiple Chipset Vulnerabilities

MediaTek has released a comprehensive security bulletin addressing 16 critical vulnerabilities across its extensive chipset portfolio, including smartphone, tablet, AIoT, smart display, smart platform, OTT, computer vision, audio, and TV chipsets.

The July 2025 security update reveals seven high-severity and nine medium-severity vulnerabilities that could potentially compromise device security through various attack vectors including remote code execution, privilege escalation, and denial of service attacks.

The MediaTek July 2025 security bulletin addresses 16 vulnerabilities across their chipset portfolio. Below is a comprehensive table listing all CVEs with their severity levels and titles.

CVE ID Severity Title
CVE-2025-20680 High Heap overflow in Bluetooth
CVE-2025-20681 High Out-of-bounds write in wlan
CVE-2025-20682 High Out-of-bounds write in wlan
CVE-2025-20683 High Out-of-bounds write in wlan
CVE-2025-20684 High Out-of-bounds write in wlan
CVE-2025-20685 High Heap overflow in wlan
CVE-2025-20686 High Heap overflow in wlan
CVE-2025-20687 Medium Out-of-bounds read in Bluetooth
CVE-2025-20688 Medium Out-of-bounds read in wlan
CVE-2025-20689 Medium Out-of-bounds read in wlan
CVE-2025-20690 Medium Out-of-bounds read in wlan
CVE-2025-20691 Medium Out-of-bounds read in wlan
CVE-2025-20692 Medium Out-of-bounds read in wlan
CVE-2025-20693 Medium Out-of-bounds read in wlan
CVE-2025-20694 Medium Buffer underflow in Bluetooth
CVE-2025-20695 Medium Buffer underflow in Bluetooth

The affected software versions span multiple platforms including Android 13.0, 14.0, and 15.0, various SDK releases, and OpenWRT distributions.

MediaTek has proactively notified device OEMs about these vulnerabilities at least two months before publication, allowing manufacturers adequate time to develop and deploy necessary patches.

The vulnerabilities affect a broad spectrum of MediaTek’s chipset ecosystem, from mobile processors to networking and IoT devices.

The severity assessment follows the Common Vulnerability Scoring System version 3.1 (CVSS v3.1) standards, ensuring consistent risk evaluation across the industry.

Device manufacturers and end-users should prioritize updating affected devices with the latest security patches.

The external reporting source for all vulnerabilities indicates responsible disclosure practices, highlighting the importance of collaborative security research in maintaining robust device security across the technology ecosystem.

Stay Updated on Daily Cybersecurity News . Follow us on Google News, LinkedIn, and X.


Source link