CVE-2022-26446: Denial of Service in MediaTek, Inc. MT2731, MT2735, MT6297, MT6725, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118.
AI Analysis
Technical Summary
CVE-2022-26446 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, including models MT2731 through MT8797, across multiple modem firmware versions such as LR12A, LR13, NR15, and NR16. The vulnerability resides in the 4G Radio Resource Control (RRC) component of the modem firmware, specifically related to improper input validation when processing concatenated System Information Block Type 12 (SIB12) messages, which are used for Commercial Mobile Alert System (CMAS) notifications. An attacker can exploit this flaw by sending specially crafted SIB12 messages that cause the modem system to crash, resulting in a denial of service (DoS) condition. Notably, exploitation requires no user interaction and no authentication or elevated privileges, making it remotely exploitable over the air interface. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that the system encounters an assertion failure due to unexpected input, leading to a crash. The CVSS v3.1 base score is 7.5, reflecting a high severity level with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). While no known exploits are currently reported in the wild, the wide deployment of affected MediaTek chipsets in mobile devices globally underscores the potential risk. The vendor has assigned a patch ID (MOLY00867883) and an internal issue ID (ALPS07274118), but no direct patch links are provided in the source information. This vulnerability can disrupt mobile device connectivity by crashing the modem, potentially impacting voice, data, and emergency alert services.
Potential Impact
For European organizations, the impact of CVE-2022-26446 can be significant, especially for enterprises relying on mobile broadband connectivity for critical operations, including remote work, IoT deployments, and emergency communications. A successful DoS attack on the modem could lead to loss of cellular network connectivity, interrupting business communications and data transfer. This is particularly critical for sectors such as healthcare, transportation, utilities, and public safety, where continuous mobile connectivity is essential. Additionally, mobile network operators and managed service providers in Europe could face increased support costs and customer dissatisfaction due to service disruptions on devices using affected MediaTek chipsets. The vulnerability also poses risks to consumer devices, potentially affecting millions of users across Europe, which could indirectly impact organizations through supply chain and partner disruptions. Since exploitation requires no user interaction and can be triggered remotely, attackers could leverage this vulnerability in targeted campaigns or widespread denial of service attempts, potentially coinciding with geopolitical tensions or cyber conflict scenarios affecting Europe.
Mitigation Recommendations
To mitigate CVE-2022-26446, European organizations and device manufacturers should prioritize applying firmware updates and patches provided by MediaTek or device vendors as soon as they become available. Network operators should monitor for unusual signaling or malformed SIB12 messages indicative of exploitation attempts and implement filtering or anomaly detection at the radio access network level to block suspicious CMAS message traffic. Device management platforms should enforce strict update policies to ensure modems run patched firmware versions (LR12A, LR13, NR15, NR16 or later). For critical infrastructure relying on mobile connectivity, consider deploying redundant communication paths or fallback mechanisms to minimize impact from modem outages. Security teams should also engage with mobile network providers to understand their mitigation strategies and incident response plans related to this vulnerability. Finally, raising awareness among end users about the importance of timely device updates can help reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2022-26446: Denial of Service in MediaTek, Inc. MT2731, MT2735, MT6297, MT6725, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6789, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6879, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT6895, MT6983, MT8385, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8786, MT8788, MT8789, MT8791, MT8797
Description
In Modem 4G RRC, there is a possible system crash due to improper input validation. This could lead to remote denial of service, when concatenating improper SIB12 (CMAS message), with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00867883; Issue ID: ALPS07274118.
AI-Powered Analysis
Technical Analysis
CVE-2022-26446 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, including models MT2731 through MT8797, across multiple modem firmware versions such as LR12A, LR13, NR15, and NR16. The vulnerability resides in the 4G Radio Resource Control (RRC) component of the modem firmware, specifically related to improper input validation when processing concatenated System Information Block Type 12 (SIB12) messages, which are used for Commercial Mobile Alert System (CMAS) notifications. An attacker can exploit this flaw by sending specially crafted SIB12 messages that cause the modem system to crash, resulting in a denial of service (DoS) condition. Notably, exploitation requires no user interaction and no authentication or elevated privileges, making it remotely exploitable over the air interface. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that the system encounters an assertion failure due to unexpected input, leading to a crash. The CVSS v3.1 base score is 7.5, reflecting a high severity level with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). While no known exploits are currently reported in the wild, the wide deployment of affected MediaTek chipsets in mobile devices globally underscores the potential risk. The vendor has assigned a patch ID (MOLY00867883) and an internal issue ID (ALPS07274118), but no direct patch links are provided in the source information. This vulnerability can disrupt mobile device connectivity by crashing the modem, potentially impacting voice, data, and emergency alert services.
Potential Impact
For European organizations, the impact of CVE-2022-26446 can be significant, especially for enterprises relying on mobile broadband connectivity for critical operations, including remote work, IoT deployments, and emergency communications. A successful DoS attack on the modem could lead to loss of cellular network connectivity, interrupting business communications and data transfer. This is particularly critical for sectors such as healthcare, transportation, utilities, and public safety, where continuous mobile connectivity is essential. Additionally, mobile network operators and managed service providers in Europe could face increased support costs and customer dissatisfaction due to service disruptions on devices using affected MediaTek chipsets. The vulnerability also poses risks to consumer devices, potentially affecting millions of users across Europe, which could indirectly impact organizations through supply chain and partner disruptions. Since exploitation requires no user interaction and can be triggered remotely, attackers could leverage this vulnerability in targeted campaigns or widespread denial of service attempts, potentially coinciding with geopolitical tensions or cyber conflict scenarios affecting Europe.
Mitigation Recommendations
To mitigate CVE-2022-26446, European organizations and device manufacturers should prioritize applying firmware updates and patches provided by MediaTek or device vendors as soon as they become available. Network operators should monitor for unusual signaling or malformed SIB12 messages indicative of exploitation attempts and implement filtering or anomaly detection at the radio access network level to block suspicious CMAS message traffic. Device management platforms should enforce strict update policies to ensure modems run patched firmware versions (LR12A, LR13, NR15, NR16 or later). For critical infrastructure relying on mobile connectivity, consider deploying redundant communication paths or fallback mechanisms to minimize impact from modem outages. Security teams should also engage with mobile network providers to understand their mitigation strategies and incident response plans related to this vulnerability. Finally, raising awareness among end users about the importance of timely device updates can help reduce exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2022-03-04T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9838c4522896dcbec611
Added to database: 5/21/2025, 9:09:12 AM
Last enriched: 7/2/2025, 1:12:18 AM
Last updated: 8/14/2025, 5:40:14 PM
Views: 18
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.