Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mediatek
Mediatek mt6878 Mediatek mt6897 Mediatek mt6899 Mediatek mt6985 Mediatek mt6989 Mediatek mt6991 Mediatek mt6993 Mediatek mt8792 Mediatek mt8796 Mediatek mt8798 |
|
| Vendors & Products |
Mediatek
Mediatek mt6878 Mediatek mt6897 Mediatek mt6899 Mediatek mt6985 Mediatek mt6989 Mediatek mt6991 Mediatek mt6993 Mediatek mt8792 Mediatek mt8796 Mediatek mt8798 |
Tue, 06 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In seninf, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10251210; Issue ID: MSV-4926. | |
| Weaknesses | CWE-415 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2026-01-07T04:55:54.554Z
Reserved: 2024-11-01T01:21:50.406Z
Link: CVE-2025-20801
Updated: 2026-01-06T14:21:00.635Z
Status : Received
Published: 2026-01-06T02:15:44.190
Modified: 2026-01-06T19:16:02.010
Link: CVE-2025-20801
No data.
OpenCVE Enrichment
Updated: 2026-01-06T14:16:07Z