CVE-2023-32886: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
AI Analysis
Technical Summary
CVE-2023-32886 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT8798, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, MT6983T/W/Z, MT6895T, MT6896, MT6985T, MT8791T, and others. The vulnerability resides in the Modem IMS SMS User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw is classified under CWE-787 (Out-of-bounds Write), which can corrupt memory and cause instability. Exploitation of this vulnerability can result in a remote denial of service (DoS) without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability affects modem firmware versions NR15, NR16, and NR17. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, but the wide deployment of these MediaTek chipsets in mobile devices and IoT equipment increases the risk profile. The vulnerability can be triggered remotely via crafted SMS messages processed by the IMS SMS UA, causing the modem to crash or reboot, disrupting cellular connectivity and potentially impacting dependent services. MediaTek has assigned patch ID MOLY00730807 to address this issue, but no public patch links are currently available.
Potential Impact
For European organizations, the impact of CVE-2023-32886 can be significant, especially for enterprises and service providers relying on devices using affected MediaTek modems. The denial of service condition can disrupt mobile communications, leading to loss of connectivity for critical mobile endpoints, including smartphones, IoT devices, and embedded systems used in industrial, healthcare, and transportation sectors. This disruption can affect business continuity, emergency communications, and operational technology systems that depend on cellular networks. Telecommunications providers and mobile virtual network operators (MVNOs) in Europe may face increased support calls and service degradation if devices in their networks are targeted. Additionally, enterprises using mobile broadband for remote sites or mobile workforce connectivity could experience outages. Although the vulnerability does not allow code execution or data compromise, the availability impact alone can cause operational and reputational damage. The lack of required user interaction and privileges means attackers can exploit this remotely and at scale, potentially causing widespread service interruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Identify all devices and equipment using affected MediaTek modem chipsets, including smartphones, IoT gateways, and embedded cellular modules. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates incorporating patch MOLY00730807 as soon as they become available. 3) Implement network-level filtering to detect and block suspicious or malformed SMS messages targeting IMS SMS UA components, leveraging telecom provider capabilities or mobile device management (MDM) solutions. 4) Monitor cellular network endpoints for unusual reboots, crashes, or connectivity losses that may indicate exploitation attempts. 5) For critical infrastructure and industrial IoT deployments, consider network segmentation and fallback communication methods to maintain availability during potential modem outages. 6) Engage with telecom providers to understand their mitigation strategies and ensure rapid incident response capabilities. 7) Educate security teams about this vulnerability to enhance detection and response readiness. These steps go beyond generic patching advice by emphasizing asset identification, network filtering, monitoring, and coordination with vendors and telecom providers.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-32886: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990, MT8673, MT8675, MT8676, MT8791, MT8791T, MT8792, MT8796, MT8797, MT8798
Description
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
AI-Powered Analysis
Technical Analysis
CVE-2023-32886 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT8798, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, MT6983T/W/Z, MT6895T, MT6896, MT6985T, MT8791T, and others. The vulnerability resides in the Modem IMS SMS User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw is classified under CWE-787 (Out-of-bounds Write), which can corrupt memory and cause instability. Exploitation of this vulnerability can result in a remote denial of service (DoS) without requiring any privileges or user interaction, making it particularly dangerous. The vulnerability affects modem firmware versions NR15, NR16, and NR17. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild yet, but the wide deployment of these MediaTek chipsets in mobile devices and IoT equipment increases the risk profile. The vulnerability can be triggered remotely via crafted SMS messages processed by the IMS SMS UA, causing the modem to crash or reboot, disrupting cellular connectivity and potentially impacting dependent services. MediaTek has assigned patch ID MOLY00730807 to address this issue, but no public patch links are currently available.
Potential Impact
For European organizations, the impact of CVE-2023-32886 can be significant, especially for enterprises and service providers relying on devices using affected MediaTek modems. The denial of service condition can disrupt mobile communications, leading to loss of connectivity for critical mobile endpoints, including smartphones, IoT devices, and embedded systems used in industrial, healthcare, and transportation sectors. This disruption can affect business continuity, emergency communications, and operational technology systems that depend on cellular networks. Telecommunications providers and mobile virtual network operators (MVNOs) in Europe may face increased support calls and service degradation if devices in their networks are targeted. Additionally, enterprises using mobile broadband for remote sites or mobile workforce connectivity could experience outages. Although the vulnerability does not allow code execution or data compromise, the availability impact alone can cause operational and reputational damage. The lack of required user interaction and privileges means attackers can exploit this remotely and at scale, potentially causing widespread service interruptions.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Identify all devices and equipment using affected MediaTek modem chipsets, including smartphones, IoT gateways, and embedded cellular modules. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates incorporating patch MOLY00730807 as soon as they become available. 3) Implement network-level filtering to detect and block suspicious or malformed SMS messages targeting IMS SMS UA components, leveraging telecom provider capabilities or mobile device management (MDM) solutions. 4) Monitor cellular network endpoints for unusual reboots, crashes, or connectivity losses that may indicate exploitation attempts. 5) For critical infrastructure and industrial IoT deployments, consider network segmentation and fallback communication methods to maintain availability during potential modem outages. 6) Engage with telecom providers to understand their mitigation strategies and ensure rapid incident response capabilities. 7) Educate security teams about this vulnerability to enhance detection and response readiness. These steps go beyond generic patching advice by emphasizing asset identification, network filtering, monitoring, and coordination with vendors and telecom providers.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2023-05-16T03:04:32.173Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc1182aa0cae27ff2e5
Added to database: 6/3/2025, 2:59:13 PM
Last enriched: 7/4/2025, 7:11:32 AM
Last updated: 8/10/2025, 8:44:28 AM
Views: 15
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.