Description
In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10432500; Issue ID: MSV-5803.
Published: 2026-03-02
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in MediaTek's MAE component involves a missing bounds check that allows an out‑of‑bounds write. Because the write can occur to arbitrary memory locations, a local attacker who already holds System privilege can alter critical data and thereby elevate privileges further. This flaw does not require user interaction to be triggered, making it a straightforward local privilege escalation path.

Affected Systems

This issue affects several MediaTek chipsets, including the MT2718, MT6899, MT6991, MT8678, and MT8793 series. The problem also applies to devices running Android 15 where the MAE component is present. No specific firmware or operating system versions are listed, so all current releases of these chipsets should be presumed vulnerable until patched.

Risk and Exploitability

The CVSS score of 6.7 indicates a moderate severity. The EPSS score is below 1%, suggesting that, at present, exploit activity is unlikely. The flaw is not included in the CISA KEV catalog, further indicating no widespread exploitation. Because the attacker needs to have already obtained System privilege, the direct attack vector is local and may involve escalation from an existing high‑privilege account. An attacker can take advantage of the memory overwrite to modify critical kernel structures or files, compromising device integrity.

Generated by OpenCVE AI on April 16, 2026 at 05:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the MediaTek MAE vulnerability patch ALPS10432500 to all affected chipsets
  • If patch cannot be applied immediately, limit the use of services that generate MAE tasks and enforce least privilege on processes that can reach the System privilege
  • Continuously monitor for suspicious activities that could indicate exploitation attempts of the out‑of‑bounds write

Generated by OpenCVE AI on April 16, 2026 at 05:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Title Out-of-Bounds Write in MediaTek MAE Allows Local Privilege Escalation

Tue, 03 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Mediatek
Mediatek mt2718
Mediatek mt6899
Mediatek mt6991
Mediatek mt8678
Mediatek mt8793
CPEs cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
Vendors & Products Google
Google android
Mediatek
Mediatek mt2718
Mediatek mt6899
Mediatek mt6991
Mediatek mt8678
Mediatek mt8793

Mon, 02 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
Description In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10432500; Issue ID: MSV-5803.
Weaknesses CWE-787
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2026-03-30T13:05:55.532Z

Reserved: 2025-11-03T01:30:59.012Z

Link: CVE-2026-20441

cve-icon Vulnrichment

Updated: 2026-03-02T13:27:10.821Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T09:16:17.447

Modified: 2026-03-03T13:02:46.403

Link: CVE-2026-20441

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T06:00:10Z

Weaknesses