Skip to main content

CVE-2023-32886: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798

High
VulnerabilityCVE-2023-32886cvecve-2023-32886
Published: Tue Jan 02 2024 (01/02/2024, 02:50:00 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798

Description

In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.

AI-Powered Analysis

AILast updated: 07/04/2025, 07:11:32 UTC

Technical Analysis

CVE-2023-32886 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT8798, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, MT6983T/W/Z, MT6895T, MT6896, MT6985T, MT8791T, and others. The vulnerability resides in the Modem IMS SMS User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw is classified under CWE-787 (Out-of-bounds Write), which can corrupt memory and cause instability. Exploitation of this vulnerability can result in a remote denial of service (DoS) without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability affects modem firmware versions NR15, NR16, and NR17. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, but the wide deployment of these MediaTek chipsets in mobile devices and IoT equipment increases the risk profile. The vulnerability can be triggered remotely via crafted SMS messages processed by the IMS SMS UA, causing the modem to crash or reboot, disrupting cellular connectivity and potentially impacting dependent services. MediaTek has assigned patch ID MOLY00730807 to address this issue, but no public patch links are currently available.

Potential Impact

For European organizations, the impact of CVE-2023-32886 can be significant, especially for enterprises and service providers relying on devices using affected MediaTek modems. The denial of service condition can disrupt mobile communications, leading to loss of connectivity for critical mobile endpoints, including smartphones, IoT devices, and embedded systems used in industrial, healthcare, and transportation sectors. This disruption can affect business continuity, emergency communications, and operational technology systems that depend on cellular networks. Telecommunications providers and mobile virtual network operators (MVNOs) in Europe may face increased support calls and service degradation if devices in their networks are targeted. Additionally, enterprises using mobile broadband for remote sites or mobile workforce connectivity could experience outages. Although the vulnerability does not allow code execution or data compromise, the availability impact alone can cause operational and reputational damage. The lack of required user interaction and privileges means attackers can exploit this remotely and at scale, potentially causing widespread service interruptions.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Identify all devices and equipment using affected MediaTek modem chipsets, including smartphones, IoT gateways, and embedded cellular modules. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates incorporating patch MOLY00730807 as soon as they become available. 3) Implement network-level filtering to detect and block suspicious or malformed SMS messages targeting IMS SMS UA components, leveraging telecom provider capabilities or mobile device management (MDM) solutions. 4) Monitor cellular network endpoints for unusual reboots, crashes, or connectivity losses that may indicate exploitation attempts. 5) For critical infrastructure and industrial IoT deployments, consider network segmentation and fallback communication methods to maintain availability during potential modem outages. 6) Engage with telecom providers to understand their mitigation strategies and ensure rapid incident response capabilities. 7) Educate security teams about this vulnerability to enhance detection and response readiness. These steps go beyond generic patching advice by emphasizing asset identification, network filtering, monitoring, and coordination with vendors and telecom providers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2023-05-16T03:04:32.173Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc1182aa0cae27ff2e5

Added to database: 6/3/2025, 2:59:13 PM

Last enriched: 7/4/2025, 7:11:32 AM

Last updated: 8/10/2025, 8:44:28 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats