Skip to main content

CVE-2023-32888: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990

High
VulnerabilityCVE-2023-32888cvecve-2023-32888
Published: Tue Jan 02 2024 (01/02/2024, 02:50:03 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990

Description

In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).

AI-Powered Analysis

AILast updated: 07/06/2025, 07:41:23 UTC

Technical Analysis

CVE-2023-32888 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT6990, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, and others. The vulnerability resides in the Modem IMS Call User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw can be triggered remotely without any authentication or user interaction, allowing an attacker to cause a denial of service (DoS) by crashing or destabilizing the modem's firmware. The affected modem versions are NR15, NR16, and NR17, which correspond to recent releases supporting 5G New Radio (NR) capabilities. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the intended buffer boundaries, potentially corrupting memory and causing system instability. The CVSS v3.1 base score is 7.5 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and MediaTek has assigned the patch ID MOLY01161830 to address this issue. However, no public patch links are provided yet. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices, IoT equipment, and embedded systems globally, making the potential attack surface large. An attacker exploiting this flaw could remotely disrupt cellular connectivity by crashing the modem, leading to service outages or device reboots, which could impact critical communications and services relying on these devices.

Potential Impact

For European organizations, the impact of CVE-2023-32888 can be substantial, particularly for those relying on devices incorporating affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises deploying IoT devices with these chipsets could experience service disruptions due to modem crashes. This could affect mobile communications, emergency services, and critical infrastructure monitoring systems that depend on cellular connectivity. The denial of service could lead to temporary loss of availability of devices, impacting business operations, customer communications, and safety-critical applications. Since exploitation requires no authentication or user interaction, attackers could remotely target vulnerable devices at scale. This raises concerns for sectors such as healthcare, transportation, utilities, and public safety in Europe, where reliable mobile connectivity is essential. Additionally, the widespread use of MediaTek chipsets in consumer smartphones and industrial equipment means that both private and public sectors could face operational interruptions. The lack of confidentiality or integrity impact reduces risks of data breaches, but availability loss alone can have severe consequences in time-sensitive environments. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s ease of exploitation and broad device footprint necessitate prompt mitigation to avoid potential attacks.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT6990) with NR15, NR16, or NR17 modem versions. This includes smartphones, IoT devices, embedded systems, and network infrastructure components. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates or patches addressing MOLY01161830 as soon as they become available. 3) Implement network-level protections such as filtering or rate limiting suspicious IMS signaling traffic that could exploit the Modem IMS Call UA component to reduce exposure. 4) Monitor device and network logs for abnormal modem crashes or reboots that may indicate attempted exploitation. 5) For critical infrastructure and enterprise environments, consider deploying redundant communication paths or failover mechanisms to maintain connectivity during potential DoS events. 6) Engage with telecom providers to understand their patch deployment timelines and request prioritization for affected network elements. 7) Educate security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. 8) Where feasible, isolate or segment vulnerable devices from critical networks to limit impact. These targeted actions go beyond generic advice by focusing on inventory management, vendor coordination, network traffic controls, and operational resilience specific to this MediaTek modem vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2023-05-16T03:04:32.174Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc85

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/6/2025, 7:41:23 AM

Last updated: 8/15/2025, 1:28:01 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats