The Indian government has issued a high-severity security warning over multiple vulnerabilities in MediaTek chipsets that power smartphones, smart TVs, and audio equipment. The warning, issued by the Indian Computer Emergency Response Team (CERT-In), follows an earlier alert from MediaTek itself.
According to CERT-In, the vulnerabilities could allow attackers to exploit Wi-Fi and Bluetooth modules, potentially granting them access to user data or control of affected devices. The notification highlighted issues like heap overflow, null pointer dereference, and incorrect authorisation in both Bluetooth and WLAN components, as well as uncontrolled recursion in IMS services.
“These vulnerabilities pose a significant risk to consumers and businesses alike,” CERT-In stated. Notably, these flaws could allow remote attackers to execute malicious code, which may result in system crashes or security breaches in devices using certain MediaTek chipsets.
The issues have been categorised under the following CVEs:
CVE-2025-20672
CVE-2025-20673
MediaTek has identified the bugs and has already issued patches to device manufacturers. Users will be able to update their devices to the latest security updates in the coming weeks.
Until then, CERT-In recommends avoiding untrusted Wi-Fi networks and Bluetooth connections, especially on devices suspected to be vulnerable. Users are also advised to check for firmware updates on their devices regularly.
Recently, a similar security concern was raised for Qualcomm-powered Android smartphones over an ongoing wave of vulnerabilities affecting major mobile chipset providers. Chipsets like Snapdragon 480+ 5G, Snapdragon 662, 8 Gen 2 and the 2024 flagship Snapdragon 8 Gen 3 were affected, putting thousands of devices at risk. However, the company released the May 2025 security update to secure the devices.
Also read: OnePlus Nord 5 series to launch next month: Check price, specs and more
Users can access the device’s settings tab to check for the latest system updates. If available, they can install the new update and reboot their devices.