Description
In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.
Published: 2026-03-02
Score: 4.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Information Disclosure
Action: Patch
AI Analysis

Impact

In the preloader component of MediaTek chipsets a logic flaw allows the reading of device unique identifiers, resulting in local disclosure of sensitive data. The defect does not require any additional privileges or user interaction and aligns with CWE‑522, indicating a failure to protect unique identifiers.

Affected Systems

MediaTek, Inc. manufactures a broad range of MT series chipsets, including MT2737, MT6739, MT6761, MT6765, MT6781, MT6813, MT6833, MT6853, MT6877, MT6880, MT6886, MT6890, MT6983, MT6989, MT6993, MT8169, MT8186, MT8190, MT8676, MT8678, MT8696, MT8793, etc. Firmware platforms such as RDK‑B 2022q3 and 2024q1, Yocto 4.0, Android 14‑16, OpenWrt 21.02.0 and 23.05.0, and Zephyr 3.7.0 are also potentially affected. MediaTek has issued Patch ID ALPS10607099, Issue ID MSV‑6118 to remediate the flaw.

Risk and Exploitability

The vulnerability carries a CVSS score of 4.6, indicating a medium impact primarily on confidentiality. The EPSS score is below 1 %, suggesting a very low probability of exploitation at present, and it is not listed in the CISA KEV catalog. Exploitation would require physical access to the device and does not depend on remote vulnerabilities or user interaction, making the risk moderate for environments with controlled physical access and modest for well‑protected deployments.

Generated by OpenCVE AI on April 16, 2026 at 05:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch ALPS10607099 to correct the preloader logic error.
  • Enforce strict physical security controls to restrict unauthorized physical access to the affected devices.
  • Perform regular firmware audits and targeted penetration testing focused on the preloader module to confirm patch deployment and uncover related weaknesses.

Generated by OpenCVE AI on April 16, 2026 at 05:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Title Local Information Disclosure via Preloader Logic Error in MediaTek Chipset

Tue, 03 Mar 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Linuxfoundation
Linuxfoundation yocto
Mediatek
Mediatek mt2737
Mediatek mt6739
Mediatek mt6761
Mediatek mt6765
Mediatek mt6768
Mediatek mt6781
Mediatek mt6789
Mediatek mt6813
Mediatek mt6833
Mediatek mt6853
Mediatek mt6855
Mediatek mt6877
Mediatek mt6878
Mediatek mt6879
Mediatek mt6880
Mediatek mt6885
Mediatek mt6886
Mediatek mt6890
Mediatek mt6893
Mediatek mt6895
Mediatek mt6897
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6990
Mediatek mt6993
Mediatek mt8169
Mediatek mt8186
Mediatek mt8188
Mediatek mt8370
Mediatek mt8390
Mediatek mt8676
Mediatek mt8678
Mediatek mt8696
Mediatek mt8793
Openwrt
Openwrt openwrt
Rdkcentral
Rdkcentral rdk-b
Zephyrproject
Zephyrproject zephyr
CPEs cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*
cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:*
cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*
Vendors & Products Google
Google android
Linuxfoundation
Linuxfoundation yocto
Mediatek
Mediatek mt2737
Mediatek mt6739
Mediatek mt6761
Mediatek mt6765
Mediatek mt6768
Mediatek mt6781
Mediatek mt6789
Mediatek mt6813
Mediatek mt6833
Mediatek mt6853
Mediatek mt6855
Mediatek mt6877
Mediatek mt6878
Mediatek mt6879
Mediatek mt6880
Mediatek mt6885
Mediatek mt6886
Mediatek mt6890
Mediatek mt6893
Mediatek mt6895
Mediatek mt6897
Mediatek mt6983
Mediatek mt6985
Mediatek mt6989
Mediatek mt6990
Mediatek mt6993
Mediatek mt8169
Mediatek mt8186
Mediatek mt8188
Mediatek mt8370
Mediatek mt8390
Mediatek mt8676
Mediatek mt8678
Mediatek mt8696
Mediatek mt8793
Openwrt
Openwrt openwrt
Rdkcentral
Rdkcentral rdk-b
Zephyrproject
Zephyrproject zephyr

Mon, 02 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.
Weaknesses CWE-522
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2026-03-30T13:05:38.348Z

Reserved: 2025-11-03T01:30:59.011Z

Link: CVE-2026-20435

cve-icon Vulnrichment

Updated: 2026-03-02T13:34:55.071Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T09:16:16.600

Modified: 2026-03-03T12:52:46.900

Link: CVE-2026-20435

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:00:10Z

Weaknesses