Impact
The vulnerability in MediaTek's MAE component involves a missing bounds check that allows an out‑of‑bounds write. Because the write can occur to arbitrary memory locations, a local attacker who already holds System privilege can alter critical data and thereby elevate privileges further. This flaw does not require user interaction to be triggered, making it a straightforward local privilege escalation path.
Affected Systems
This issue affects several MediaTek chipsets, including the MT2718, MT6899, MT6991, MT8678, and MT8793 series. The problem also applies to devices running Android 15 where the MAE component is present. No specific firmware or operating system versions are listed, so all current releases of these chipsets should be presumed vulnerable until patched.
Risk and Exploitability
The CVSS score of 6.7 indicates a moderate severity. The EPSS score is below 1%, suggesting that, at present, exploit activity is unlikely. The flaw is not included in the CISA KEV catalog, further indicating no widespread exploitation. Because the attacker needs to have already obtained System privilege, the direct attack vector is local and may involve escalation from an existing high‑privilege account. An attacker can take advantage of the memory overwrite to modify critical kernel structures or files, compromising device integrity.
OpenCVE Enrichment