MediaTek's October 2025 Product Security Bulletin discloses several high and medium priority vulnerabilities on its WLAN (Wi-Fi), GNSS (Global Navigation Satellite System), and imaging elements. Multiple of these vulnerabilities, especially within Wi-Fi chipsets, would enable intruders in wireless proximity to use memory-related defects for nefarious intentions like device crashes, code execution, or kernel memory corruption. The high-severity vulnerabilities are localized in MediaTek's WLAN chipsets, such as the MT6890, MT7915, MT7981, and MT7986 families. Specifically, CVE-2025-20712 reports a heap overflow in the WLAN module due to improper bounds checking, affecting MT6990, MT7990, MT7991, MT7992, and MT7993. Furthermore, CVE-2025-20709 and CVE-2025-20710 refer to a traditional buffer overflow and an integer overflow due to improper bounds checks. The most serious, CVE-2025-20718, is a stack overflow vulnerability on both legacy and latest chipsets, such as MT7603, MT7622, and MT7986, which could potentially allow out-of-bounds writes. Medium-severity vulnerabilities were found in GNSS and image sensor components as well. CVE-2025-20722 and CVE-2025-20723 impact GNSS firmware processing in chipsets such as MT6835 and MT6989, which include integer overflows and improper error correction code that may cause out-of-bounds reads or writes. Additionally, CVE-2025-20721 attacks the imgsensor driver in chipsets such as MT6886 and MT8195, where lack of input validation may lead to memory corruption.MediaTek encourages device manufacturers and consumers to implement the latest firmware patches as soon as they are available. Keeping systems current helps to reduce the threat posed by these vulnerabilities and preserve device security on consumer, IoT, and automotive platforms.
A large-scale botnet campaign is actively targeting Remote Desktop Protocol (RDP) services in the United States, leveraging over 100,000 IP addresses from more than 100 countries. ...
On October 14, 2025, Microsoft officially ended support and security updates for Windows 10, marking its transition to end-of-life (EOL). From a cybersecurity perspective, this eve...
Cybersecurity researchers have identified a new campaign distributing the Astaroth banking trojan, which uses GitHub as a resilient infrastructure to bypass traditional takedown ef...