CVE-2023-32886: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
AI Analysis
Technical Summary
CVE-2023-32886 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT8798, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, MT6983T/W/Z, MT6895T, MT6896, MT6985T, MT8791T, and others. The vulnerability resides in the Modem IMS SMS User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw is classified under CWE-787 (Out-of-bounds Write), which can corrupt memory and cause instability. Exploitation of this vulnerability can result in a remote denial of service (DoS) without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability affects modem firmware versions NR15, NR16, and NR17. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, but the wide deployment of these MediaTek chipsets in mobile devices and IoT equipment increases the risk profile. The vulnerability can be triggered remotely via crafted SMS messages processed by the IMS SMS UA, causing the modem to crash or reboot, disrupting cellular connectivity and potentially impacting dependent services. MediaTek has assigned patch ID MOLY00730807 to address this issue, but no public patch links are currently available.
Potential Impact
For European organizations, the impact of CVE-2023-32886 can be significant, especially for enterprises and service providers relying on devices using affected MediaTek modems. The denial of service condition can disrupt mobile communications, leading to loss of connectivity for critical mobile endpoints, including smartphones, IoT devices, and embedded systems used in industrial, healthcare, and transportation sectors. This disruption can affect business continuity, emergency communications, and operational technology systems that depend on cellular networks. Telecommunications providers and mobile virtual network operators (MVNOs) in Europe may face increased support calls and service degradation if devices in their networks are targeted. Additionally, enterprises using mobile broadband for remote sites or mobile workforce connectivity could experience outages. Although the vulnerability does not allow code execution or data compromise, the availability impact alone can cause operational and reputational damage. The lack of required user interaction and privileges means attackers can exploit this remotely and at scale, potentially causing widespread service interruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Identify all devices and equipment using affected MediaTek modem chipsets, including smartphones, IoT gateways, and embedded cellular modules. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates incorporating patch MOLY00730807 as soon as they become available. 3) Implement network-level filtering to detect and block suspicious or malformed SMS messages targeting IMS SMS UA components, leveraging telecom provider capabilities or mobile device management (MDM) solutions. 4) Monitor cellular network endpoints for unusual reboots, crashes, or connectivity losses that may indicate exploitation attempts. 5) For critical infrastructure and industrial IoT deployments, consider network segmentation and fallback communication methods to maintain availability during potential modem outages. 6) Engage with telecom providers to understand their mitigation strategies and ensure rapid incident response capabilities. 7) Educate security teams about this vulnerability to enhance detection and response readiness. These steps go beyond generic patching advice by emphasizing asset identification, network filtering, monitoring, and coordination with vendors and telecom providers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-32886: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798
Description
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
AI-Powered Analysis
Technical Analysis
CVE-2023-32886 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT8798, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, MT6983T/W/Z, MT6895T, MT6896, MT6985T, MT8791T, and others. The vulnerability resides in the Modem IMS SMS User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw is classified under CWE-787 (Out-of-bounds Write), which can corrupt memory and cause instability. Exploitation of this vulnerability can result in a remote denial of service (DoS) without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability affects modem firmware versions NR15, NR16, and NR17. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, but the wide deployment of these MediaTek chipsets in mobile devices and IoT equipment increases the risk profile. The vulnerability can be triggered remotely via crafted SMS messages processed by the IMS SMS UA, causing the modem to crash or reboot, disrupting cellular connectivity and potentially impacting dependent services. MediaTek has assigned patch ID MOLY00730807 to address this issue, but no public patch links are currently available.
Potential Impact
For European organizations, the impact of CVE-2023-32886 can be significant, especially for enterprises and service providers relying on devices using affected MediaTek modems. The denial of service condition can disrupt mobile communications, leading to loss of connectivity for critical mobile endpoints, including smartphones, IoT devices, and embedded systems used in industrial, healthcare, and transportation sectors. This disruption can affect business continuity, emergency communications, and operational technology systems that depend on cellular networks. Telecommunications providers and mobile virtual network operators (MVNOs) in Europe may face increased support calls and service degradation if devices in their networks are targeted. Additionally, enterprises using mobile broadband for remote sites or mobile workforce connectivity could experience outages. Although the vulnerability does not allow code execution or data compromise, the availability impact alone can cause operational and reputational damage. The lack of required user interaction and privileges means attackers can exploit this remotely and at scale, potentially causing widespread service interruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Identify all devices and equipment using affected MediaTek modem chipsets, including smartphones, IoT gateways, and embedded cellular modules. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates incorporating patch MOLY00730807 as soon as they become available. 3) Implement network-level filtering to detect and block suspicious or malformed SMS messages targeting IMS SMS UA components, leveraging telecom provider capabilities or mobile device management (MDM) solutions. 4) Monitor cellular network endpoints for unusual reboots, crashes, or connectivity losses that may indicate exploitation attempts. 5) For critical infrastructure and industrial IoT deployments, consider network segmentation and fallback communication methods to maintain availability during potential modem outages. 6) Engage with telecom providers to understand their mitigation strategies and ensure rapid incident response capabilities. 7) Educate security teams about this vulnerability to enhance detection and response readiness. These steps go beyond generic patching advice by emphasizing asset identification, network filtering, monitoring, and coordination with vendors and telecom providers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2023-05-16T03:04:32.173Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc1182aa0cae27ff2e5
Added to database: 6/3/2025, 2:59:13 PM
Last enriched: 7/4/2025, 7:11:32 AM
Last updated: 12/2/2025, 10:12:54 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13871: CWE-352 Cross-Site Request Forgery (CSRF) in ObjectPlanet Opinio
LowCVE-2025-10971: CWE-922 Insecure Storage of Sensitive Information in FERMAX ELECTRÓNICA S.A.U MeetMe
HighCVE-2025-13696: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in softdiscover Zigaform – Price Calculator & Cost Estimation Form Builder Lite
MediumCVE-2025-11726: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13685: CWE-352 Cross-Site Request Forgery (CSRF) in ays-pro Photo Gallery by Ays – Responsive Image Gallery
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.