Description
In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.
Published: 2026-05-04
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in MediaTek's geniezone component, where a missing permission check allows a user already in possession of System privilege to elevate themselves to a higher privilege level. It is a classic privilege‑escalation vulnerability catalogued as CWE‑280. No additional user interaction or remote access is required; once System privilege is achieved, the attacker can expand control over the device firmware.

Affected Systems

MediaTek, Inc. chipset firmware, particularly the geniezone subsystem, is affected. The presence of patch ID ALPS10708513 in the MediaTek product‑security bulletin indicates the issue exists in current or recent firmware releases. Specific version ranges are not listed, so users should consult the bulletin for details.

Risk and Exploitability

The EPSS estimate is less than 1% and the vulnerability is not listed in CISA's KEV catalog, suggesting no widespread exploitation so far. The CVSS score of 6.7 indicates a moderate severity. Nevertheless, because no user interaction is needed and the flaw can be triggered by anyone who already holds System privilege, the risk remains significant in environments where such privileges can be attained. The attacker must first obtain or compromise System level access; thereafter the privilege escalation can proceed unimpeded, potentially giving full control over the device.

Generated by OpenCVE AI on May 4, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MediaTek firmware to a version that includes patch ALPS10708513
  • Restrict assignment of System privileges to trusted accounts and processes on the device
  • Limit and monitor access to geniezone’s privileged functions and review audit logs for unauthorized privilege changes

Generated by OpenCVE AI on May 4, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 15:30:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Missing Permission Check in MediaTek geniezone

Mon, 04 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek, Inc.
Mediatek, Inc. mediatek Chipset
Vendors & Products Mediatek, Inc.
Mediatek, Inc. mediatek Chipset

Mon, 04 May 2026 08:15:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Missing Permission Check in MediaTek geniezone

Mon, 04 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.
Weaknesses CWE-280
References

Subscriptions

Mediatek, Inc. Mediatek Chipset
cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2026-05-05T03:56:07.381Z

Reserved: 2025-11-03T01:30:59.013Z

Link: CVE-2026-20448

cve-icon Vulnrichment

Updated: 2026-05-04T12:57:10.995Z

cve-icon NVD

Status : Received

Published: 2026-05-04T07:15:59.500

Modified: 2026-05-04T14:16:32.230

Link: CVE-2026-20448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T15:15:03Z

Weaknesses