MediaTek has released its Product Security Bulletin for September 2025, detailing a series of critical and moderate vulnerabilities affecting its modem and system components. These issues, evaluated using CVSS v3.1, include three high-severity and three medium-severity flaws. The company assures that all impacted OEM partners received security patches at least two months prior to disclosure, and no active exploitation has been detected in real-world scenarios thus far. There are three major vulnerabilities in the modem's subsystem: two out-of-bounds write flaws and one out-of-bounds read flaw. CVE-2025-20708 allows remote privilege escalation without user interaction when a device connects to a malicious base station, affecting over 70 MediaTek chipsets. CVE-2025-20703 enables a denial-of-service attack under similar conditions, while CVE-2025-20704 requires user interaction but may still result in privilege escalation across select chipsets. Additionally, the bulletin identifies three medium-risk use-after-free flaws in system-level drivers. A security vulnerability, officially designated as CVE-2025-20705, has been identified within the monitor_hang driver. This flaw could enable a local privilege escalation attack on devices using Android versions 13.0 through 16.0, as well as those running on OpenWRT or Yocto platforms. CVE-2025-20706 and CVE-2025-20707 impact components like mbrain and geniezone, posing similar local threats on specific Android versions and chipset combinations. MediaTek underscores its commitment to device security, urging manufacturers to promptly integrate the provided patches into upcoming firmware releases. The company emphasizes that coordinated disclosure and early mitigation efforts are key elements of its security strategy. Version 1.0 of this bulletin, dated September 1, 2025, encourages OEMs and researchers to cross-check their device inventories and report any additional issues via the official vulnerability reporting portal.
Microsoft has released its September 2025 Patch Tuesday security updates, addressing 81 vulnerabilities, including two publicly disclosed zero-day flaws (CVE-2025-55234 and CVE-202...
Rockwell Automation has issued a critical advisory for a vulnerability tracked as CVE-2025-7350, affecting its Stratix industrial Ethernet switches. The flaw, rated 9.6 CVSS 3.1 sc...
In June 2025, Chess.com suffered a data breach when attackers exploited a third-party file transfer tool used by the platform. The intrusion took place between June 5 and June 18, ...