Mediatek Vulnerabilities
Comprehensive security vulnerability database for Mediatek products
4
0
4
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-20436 | 6.7 | This vulnerability allows an attacker with system privileges to gain even higher privileges on devices using the MediaTek NB-IoT SDK, potentially giving them more control over the system. The attacker does not need any user interaction to exploit this flaw, but they must already have access to the system. | mediateknbiot sdk | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20434 | 7.5 | This vulnerability allows an attacker to gain higher privileges on a device by exploiting a flaw in the modem, but it requires the victim to connect to a malicious base station set up by the attacker. User interaction is necessary for the attack to succeed, meaning the victim must unknowingly connect to the rogue network. | mediateklr12a | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20430 | 8.8 | This vulnerability allows an attacker to gain higher privileges on a device using MediaTek's software development kit, potentially letting them control the device without needing any special permissions. The attacker only needs to be nearby to exploit this flaw, and no user interaction is required. | mediateksoftware development kit | Exploit Available | about 1 month agoMar 2, 2026 |
| CVE-2026-20423 | 7.8 | This vulnerability allows an attacker to gain higher privileges on a device using the Mediatek nbiot SDK, potentially letting them execute unauthorized actions. While the attacker needs to have user access to the device, they do not need any interaction from the user to exploit this flaw. | mediateknbiot sdk | Exploit Available | about 1 month agoMar 2, 2026 |
About Mediatek Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Mediatek products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.