Description
In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.
Published: 2026-02-02
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a use‑after‑free in the cameraisp component. It can be triggered when a Free operation leaves a dangling pointer that is subsequently dereferenced by code executing with system privileges. The result is a local denial of service that can crash the cameraisp process or otherwise disable camera functionality. Because the flaw is exploitable only after system privilege has already been achieved, it does not provide an additional elevation of privilege but can render the device non‑operational for the user.

Affected Systems

Affected systems include MediaTek chipsets such as MT6878, MT6879, MT6881, MT6886, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6991, MT6993, MT8168, MT8188, MT8195, MT8365, MT8370, MT8390, MT8395, MT8666, MT8667, MT8673, MT8676, MT8793, and Android platforms ranging from version 13.0 through 16.0 that incorporate these chipsets. These components are found in a range of Android devices supplied by MediaTek.

Risk and Exploitability

The CVSS score of 7.8 indicates a high risk, but the EPSS score of less than 1% signifies that exploitation is considered unlikely at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is local with no user interaction required; an adversary must already possess system privileges to trigger the flaw. If the software is patched, the risk is mitigated, though operators should be aware that the flaw could be leveraged to crash the camera subsystem and disrupt device availability.

Generated by OpenCVE AI on April 16, 2026 at 07:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official MediaTek firmware patch identified by ALPS10351676 to address the use‑after‑free in cameraisp.
  • If an update is not yet available, limit the cameraisp service’s permissions so that only privileged processes can access it, thereby preventing unprivileged local users from triggering the flaw.
  • Verify that memory deallocation routines in cameraisp consistently clear or nullify pointers after a free operation, and enforce these practices in future builds to avoid dangling references.

Generated by OpenCVE AI on April 16, 2026 at 07:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
Title Use‑After‑Free in Cameraisp Causes Local Denial of Service on MediaTek Chipsets

Wed, 04 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Mediatek mt6881
CPEs cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6881:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
Vendors & Products Google
Google android
Mediatek mt6881

Wed, 04 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek
Mediatek mt6781
Mediatek mt6878
Mediatek mt6879
Mediatek mt6886
Mediatek mt6895
Mediatek mt6897
Mediatek mt6899
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6991
Mediatek mt6993
Mediatek mt8168
Mediatek mt8188
Mediatek mt8195
Mediatek mt8365
Mediatek mt8370
Mediatek mt8390
Mediatek mt8395
Mediatek mt8666
Mediatek mt8667
Mediatek mt8673
Mediatek mt8676
Mediatek mt8793
Vendors & Products Mediatek
Mediatek mt6781
Mediatek mt6878
Mediatek mt6879
Mediatek mt6886
Mediatek mt6895
Mediatek mt6897
Mediatek mt6899
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6991
Mediatek mt6993
Mediatek mt8168
Mediatek mt8188
Mediatek mt8195
Mediatek mt8365
Mediatek mt8370
Mediatek mt8390
Mediatek mt8395
Mediatek mt8666
Mediatek mt8667
Mediatek mt8673
Mediatek mt8676
Mediatek mt8793

Mon, 02 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
Description In cameraisp, there is a possible escalation of privilege due to use after free. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10351676; Issue ID: MSV-5737.
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2026-03-30T13:03:06.262Z

Reserved: 2025-11-03T01:30:59.008Z

Link: CVE-2026-20411

cve-icon Vulnrichment

Updated: 2026-02-02T18:29:16.789Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T09:15:56.040

Modified: 2026-02-04T13:45:57.673

Link: CVE-2026-20411

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T07:15:28Z

Weaknesses