{"api_version":"1","generated_at":"2026-05-04T12:32:58+00:00","cve":"CVE-2026-20448","urls":{"html":"https://cve.report/CVE-2026-20448","api":"https://cve.report/api/cve/CVE-2026-20448.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-20448","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-20448"},"summary":{"title":"CVE-2026-20448","description":"In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.","state":"PUBLISHED","assigner":"MediaTek","published_at":"2026-05-04 07:15:59","updated_at":"2026-05-04 07:15:59"},"problem_types":["CWE-280","CWE-280 CWE-280 Improper Handling of Insufficient Permissions or Privileges"],"metrics":[],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/May-2026","name":"https://corp.mediatek.com/product-security-bulletin/May-2026","refsource":"security@mediatek.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-20448","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-20448","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6765","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6768","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6789","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6877","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6897","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6899","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6989","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6991","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT6993","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8367","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8766","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8768","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8775","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8781","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8786","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8788E","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8791T","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8792","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8793","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8796","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8893","platforms":[]},{"source":"CNA","vendor":"MediaTek, Inc.","product":"MediaTek chipset","version":"affected MT8910","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"MediaTek chipset","vendor":"MediaTek, Inc.","versions":[{"status":"affected","version":"MT6765"},{"status":"affected","version":"MT6768"},{"status":"affected","version":"MT6789"},{"status":"affected","version":"MT6877"},{"status":"affected","version":"MT6897"},{"status":"affected","version":"MT6899"},{"status":"affected","version":"MT6989"},{"status":"affected","version":"MT6991"},{"status":"affected","version":"MT6993"},{"status":"affected","version":"MT8367"},{"status":"affected","version":"MT8766"},{"status":"affected","version":"MT8768"},{"status":"affected","version":"MT8775"},{"status":"affected","version":"MT8781"},{"status":"affected","version":"MT8786"},{"status":"affected","version":"MT8788E"},{"status":"affected","version":"MT8791T"},{"status":"affected","version":"MT8792"},{"status":"affected","version":"MT8793"},{"status":"affected","version":"MT8796"},{"status":"affected","version":"MT8893"},{"status":"affected","version":"MT8910"}]}],"descriptions":[{"lang":"en","value":"In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-280","description":"CWE-280 Improper Handling of Insufficient Permissions or Privileges","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-04T05:41:52.927Z","orgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","shortName":"MediaTek"},"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/May-2026"}],"x_generator":{"engine":"cvelib 1.8.0"}}},"cveMetadata":{"assignerOrgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","assignerShortName":"MediaTek","cveId":"CVE-2026-20448","datePublished":"2026-05-04T05:41:52.927Z","dateReserved":"2025-11-03T01:30:59.013Z","dateUpdated":"2026-05-04T05:41:52.927Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-04 07:15:59","lastModifiedDate":"2026-05-04 07:15:59","problem_types":["CWE-280","CWE-280 CWE-280 Improper Handling of Insufficient Permissions or Privileges"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"20448","Ordinal":"1","Title":"CVE-2026-20448","CVE":"CVE-2026-20448","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"20448","Ordinal":"1","NoteData":"In geniezone, there is a possible escalation of privilege due to a missing permission check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS10708513; Issue ID: MSV-6281.","Type":"Description","Title":"CVE-2026-20448"}]}}}