CVE-2023-32888: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).
AI Analysis
Technical Summary
CVE-2023-32888 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT6990, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, and others. The vulnerability resides in the Modem IMS Call User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw can be triggered remotely without any authentication or user interaction, allowing an attacker to cause a denial of service (DoS) by crashing or destabilizing the modem's firmware. The affected modem versions are NR15, NR16, and NR17, which correspond to recent releases supporting 5G New Radio (NR) capabilities. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the intended buffer boundaries, potentially corrupting memory and causing system instability. The CVSS v3.1 base score is 7.5 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and MediaTek has assigned the patch ID MOLY01161830 to address this issue. However, no public patch links are provided yet. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices, IoT equipment, and embedded systems globally, making the potential attack surface large. An attacker exploiting this flaw could remotely disrupt cellular connectivity by crashing the modem, leading to service outages or device reboots, which could impact critical communications and services relying on these devices.
Potential Impact
For European organizations, the impact of CVE-2023-32888 can be substantial, particularly for those relying on devices incorporating affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises deploying IoT devices with these chipsets could experience service disruptions due to modem crashes. This could affect mobile communications, emergency services, and critical infrastructure monitoring systems that depend on cellular connectivity. The denial of service could lead to temporary loss of availability of devices, impacting business operations, customer communications, and safety-critical applications. Since exploitation requires no authentication or user interaction, attackers could remotely target vulnerable devices at scale. This raises concerns for sectors such as healthcare, transportation, utilities, and public safety in Europe, where reliable mobile connectivity is essential. Additionally, the widespread use of MediaTek chipsets in consumer smartphones and industrial equipment means that both private and public sectors could face operational interruptions. The lack of confidentiality or integrity impact reduces risks of data breaches, but availability loss alone can have severe consequences in time-sensitive environments. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s ease of exploitation and broad device footprint necessitate prompt mitigation to avoid potential attacks.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT6990) with NR15, NR16, or NR17 modem versions. This includes smartphones, IoT devices, embedded systems, and network infrastructure components. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates or patches addressing MOLY01161830 as soon as they become available. 3) Implement network-level protections such as filtering or rate limiting suspicious IMS signaling traffic that could exploit the Modem IMS Call UA component to reduce exposure. 4) Monitor device and network logs for abnormal modem crashes or reboots that may indicate attempted exploitation. 5) For critical infrastructure and enterprise environments, consider deploying redundant communication paths or failover mechanisms to maintain connectivity during potential DoS events. 6) Engage with telecom providers to understand their patch deployment timelines and request prioritization for affected network elements. 7) Educate security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. 8) Where feasible, isolate or segment vulnerable devices from critical networks to limit impact. These targeted actions go beyond generic advice by focusing on inventory management, vendor coordination, network traffic controls, and operational resilience specific to this MediaTek modem vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2023-32888: Denial of Service in MediaTek, Inc. MT2735, MT6813, MT6833, MT6833P, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6877T, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983T, MT6983W, MT6983Z, MT6985, MT6985T, MT6989, MT6990
Description
In Modem IMS Call UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01161830; Issue ID: MOLY01161830 (MSV-894).
AI-Powered Analysis
Technical Analysis
CVE-2023-32888 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT2735 through MT6990, including variants such as MT6833P, MT6853T, MT6877T, MT6980D, and others. The vulnerability resides in the Modem IMS Call User Agent (UA) component, where a missing bounds check leads to an out-of-bounds write condition. This flaw can be triggered remotely without any authentication or user interaction, allowing an attacker to cause a denial of service (DoS) by crashing or destabilizing the modem's firmware. The affected modem versions are NR15, NR16, and NR17, which correspond to recent releases supporting 5G New Radio (NR) capabilities. The vulnerability is classified under CWE-787 (Out-of-bounds Write), indicating that the software writes data outside the intended buffer boundaries, potentially corrupting memory and causing system instability. The CVSS v3.1 base score is 7.5 (high), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. No known exploits are currently reported in the wild, and MediaTek has assigned the patch ID MOLY01161830 to address this issue. However, no public patch links are provided yet. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices, IoT equipment, and embedded systems globally, making the potential attack surface large. An attacker exploiting this flaw could remotely disrupt cellular connectivity by crashing the modem, leading to service outages or device reboots, which could impact critical communications and services relying on these devices.
Potential Impact
For European organizations, the impact of CVE-2023-32888 can be substantial, particularly for those relying on devices incorporating affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises deploying IoT devices with these chipsets could experience service disruptions due to modem crashes. This could affect mobile communications, emergency services, and critical infrastructure monitoring systems that depend on cellular connectivity. The denial of service could lead to temporary loss of availability of devices, impacting business operations, customer communications, and safety-critical applications. Since exploitation requires no authentication or user interaction, attackers could remotely target vulnerable devices at scale. This raises concerns for sectors such as healthcare, transportation, utilities, and public safety in Europe, where reliable mobile connectivity is essential. Additionally, the widespread use of MediaTek chipsets in consumer smartphones and industrial equipment means that both private and public sectors could face operational interruptions. The lack of confidentiality or integrity impact reduces risks of data breaches, but availability loss alone can have severe consequences in time-sensitive environments. The absence of known exploits in the wild currently limits immediate risk, but the vulnerability’s ease of exploitation and broad device footprint necessitate prompt mitigation to avoid potential attacks.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT6990) with NR15, NR16, or NR17 modem versions. This includes smartphones, IoT devices, embedded systems, and network infrastructure components. 2) Coordinate with device manufacturers and vendors to obtain and deploy firmware updates or patches addressing MOLY01161830 as soon as they become available. 3) Implement network-level protections such as filtering or rate limiting suspicious IMS signaling traffic that could exploit the Modem IMS Call UA component to reduce exposure. 4) Monitor device and network logs for abnormal modem crashes or reboots that may indicate attempted exploitation. 5) For critical infrastructure and enterprise environments, consider deploying redundant communication paths or failover mechanisms to maintain connectivity during potential DoS events. 6) Engage with telecom providers to understand their patch deployment timelines and request prioritization for affected network elements. 7) Educate security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. 8) Where feasible, isolate or segment vulnerable devices from critical networks to limit impact. These targeted actions go beyond generic advice by focusing on inventory management, vendor coordination, network traffic controls, and operational resilience specific to this MediaTek modem vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2023-05-16T03:04:32.174Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebc85
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/6/2025, 7:41:23 AM
Last updated: 8/15/2025, 1:28:01 AM
Views: 12
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.