Ad

CVE-2026-20444

MEDIUM CVSS 3.1: 6.7 EPSS 0.01%
Updated Mar 03, 2026
Google
Parameter Value
CVSS 6.7 (MEDIUM)
Type CWE-787 (Out-of-bounds Write)
Vendor Google
Public PoC No

In display, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation.

Patch ID: ALPS10436995; Issue ID: MSV-5721.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 49

Configuration From (including) Up to (excluding)
Google Android
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Google Android
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
Google Android
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
Mediatek Mt6739
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
Mediatek Mt6761
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
Mediatek Mt6765
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
Mediatek Mt6768
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
Mediatek Mt6781
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
Mediatek Mt6789
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
Mediatek Mt6833
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
Mediatek Mt6835
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
Mediatek Mt6853
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
Mediatek Mt6855
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
Mediatek Mt6877
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
Mediatek Mt6878
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
Mediatek Mt6879
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
Mediatek Mt6883
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
Mediatek Mt6885
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
Mediatek Mt6886
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
Mediatek Mt6889
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
Mediatek Mt6893
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
Mediatek Mt6895
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
Mediatek Mt6897
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
Mediatek Mt6899
cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*
Mediatek Mt6983
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
Mediatek Mt6985
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
Mediatek Mt6989
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
Mediatek Mt6991
cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*
Mediatek Mt6993
cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*
Mediatek Mt8186
cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*
Mediatek Mt8188
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*
Mediatek Mt8196
cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*
Mediatek Mt8667
cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*
Mediatek Mt8673
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
Mediatek Mt8676
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
Mediatek Mt8678
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
Mediatek Mt8765
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
Mediatek Mt8766
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
Mediatek Mt8768
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
Mediatek Mt8771
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
Mediatek Mt8781
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
Mediatek Mt8791t
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
Mediatek Mt8792
cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*
Mediatek Mt8793
cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*
Mediatek Mt8795t
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
Mediatek Mt8796
cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*
Mediatek Mt8798
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
Mediatek Mt8873
cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*
Mediatek Mt8883
cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*