CVE-2026-20411

7.8 HIGH

📋 TL;DR

This CVE describes a use-after-free vulnerability in the cameraisp component that could allow local privilege escalation. Attackers with System privilege could exploit this to cause denial of service without user interaction. This affects devices using MediaTek chipsets with vulnerable camera ISP firmware.

💻 Affected Systems

Products:
  • MediaTek chipset devices with cameraisp component
Versions: Specific versions not specified in CVE, but pre-patch versions using vulnerable cameraisp
Operating Systems: Android-based systems on MediaTek platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices where camera ISP firmware is vulnerable; requires System privilege for exploitation

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic leading to persistent denial of service requiring physical reboot

🟠

Likely Case

Local denial of service affecting camera functionality and potentially related system services

🟢

If Mitigated

Limited impact if proper privilege separation and memory protection mechanisms are in place

🌐 Internet-Facing: LOW - Requires local access and System privilege
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or compromised accounts with elevated privileges

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires System privilege to exploit; no user interaction needed once privilege is obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch ID: ALPS10351676

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/February-2026

Restart Required: Yes

Instructions:

1. Check device manufacturer for firmware updates. 2. Apply MediaTek patch ALPS10351676. 3. Reboot device to load patched cameraisp component.

🔧 Temporary Workarounds

Restrict System Privilege Access

linux

Limit which applications and users can obtain System privilege

Review and restrict SELinux/AppArmor policies for camera services
Implement principle of least privilege for all system services

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized System privilege acquisition
  • Monitor for suspicious privilege escalation attempts and camera service crashes

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against MediaTek security bulletin; examine cameraisp component version

Check Version:

Check manufacturer-specific firmware version commands (varies by device)

Verify Fix Applied:

Verify patch ALPS10351676 is applied; check camera functionality remains stable during stress testing

📡 Detection & Monitoring

Log Indicators:

  • Unexpected camera service crashes
  • Kernel panic logs related to memory management
  • Suspicious privilege escalation attempts

Network Indicators:

  • None - local exploitation only

SIEM Query:

source="kernel" AND ("cameraisp" OR "use-after-free") AND severity>=HIGH

🔗 References

📤 Share This