CVE-2024-20154: CWE-121 Stack Overflow in MediaTek, Inc. MT2735, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
AI Analysis
Technical Summary
CVE-2024-20154 is a stack overflow vulnerability classified under CWE-121 found in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6767, MT6768, MT6769 series, and many others. The root cause is a missing bounds check in the modem's code, which allows an attacker who controls a rogue base station to send specially crafted signals that trigger an out-of-bounds write in the modem's memory. This vulnerability does not require any user interaction or prior authentication, making it remotely exploitable. Successful exploitation can lead to remote code execution on the modem, potentially allowing the attacker to execute arbitrary code with the modem's privileges. This could compromise the confidentiality, integrity, and availability of the device's communication functions. The affected modem firmware versions include LR12A, LR13, NR15, NR16.R1.MP, NR16.R1.MP1MP2.MP, and NR16.R2.MP. The vulnerability was publicly disclosed on January 6, 2025, with a CVSS v3.1 base score of 8.8, indicating high severity. Although no public exploits are known at this time, the vulnerability poses a significant risk due to the widespread deployment of these chipsets in mobile devices globally. The vendor has assigned the issue ID MSV-2392 and patch ID MOLY00720348, though no direct patch links are provided in the data. The attack vector is adjacent network (AV:A), meaning the attacker must be within radio range to operate a rogue base station. The vulnerability impacts confidentiality, integrity, and availability (all rated high), and requires no privileges or user interaction, increasing its risk profile.
Potential Impact
For European organizations, the impact of CVE-2024-20154 is substantial, particularly for sectors relying heavily on mobile communications such as telecommunications providers, critical infrastructure operators, government agencies, and enterprises with mobile workforces. Exploitation could allow attackers to intercept, manipulate, or disrupt mobile communications by executing arbitrary code on the modem, potentially leading to data breaches, espionage, or denial of service. The ability to remotely compromise devices without user interaction increases the threat surface, especially in urban or densely populated areas where rogue base stations can be deployed covertly. This vulnerability could undermine trust in mobile networks and impact services dependent on cellular connectivity. Additionally, compromised devices could be used as footholds for further network intrusion or lateral movement within organizational environments. The broad range of affected chipsets means many consumer and enterprise mobile devices in Europe are at risk, amplifying the potential scale of impact.
Mitigation Recommendations
1. Immediate application of vendor-provided patches or firmware updates for affected MediaTek modem chipsets is critical once available. Organizations should engage with device manufacturers and mobile network operators to ensure timely deployment. 2. Implement network-level defenses to detect and block rogue base stations, including the use of advanced radio monitoring tools and anomaly detection systems within cellular networks. 3. Employ mobile device management (MDM) solutions to enforce firmware update policies and monitor device integrity. 4. Educate security teams about the risks of rogue base stations and encourage vigilance in environments where sensitive communications occur. 5. Collaborate with telecom providers to enhance base station authentication and integrity verification mechanisms. 6. For critical infrastructure, consider deploying additional layers of encryption and multi-factor authentication to reduce the impact of potential modem compromise. 7. Monitor threat intelligence feeds for emerging exploit code or attack campaigns targeting this vulnerability to respond swiftly. 8. Conduct regular security assessments of mobile devices and network infrastructure to identify signs of compromise or anomalous behavior related to modem exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2024-20154: CWE-121 Stack Overflow in MediaTek, Inc. MT2735, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798
Description
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
AI-Powered Analysis
Technical Analysis
CVE-2024-20154 is a stack overflow vulnerability classified under CWE-121 found in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6767, MT6768, MT6769 series, and many others. The root cause is a missing bounds check in the modem's code, which allows an attacker who controls a rogue base station to send specially crafted signals that trigger an out-of-bounds write in the modem's memory. This vulnerability does not require any user interaction or prior authentication, making it remotely exploitable. Successful exploitation can lead to remote code execution on the modem, potentially allowing the attacker to execute arbitrary code with the modem's privileges. This could compromise the confidentiality, integrity, and availability of the device's communication functions. The affected modem firmware versions include LR12A, LR13, NR15, NR16.R1.MP, NR16.R1.MP1MP2.MP, and NR16.R2.MP. The vulnerability was publicly disclosed on January 6, 2025, with a CVSS v3.1 base score of 8.8, indicating high severity. Although no public exploits are known at this time, the vulnerability poses a significant risk due to the widespread deployment of these chipsets in mobile devices globally. The vendor has assigned the issue ID MSV-2392 and patch ID MOLY00720348, though no direct patch links are provided in the data. The attack vector is adjacent network (AV:A), meaning the attacker must be within radio range to operate a rogue base station. The vulnerability impacts confidentiality, integrity, and availability (all rated high), and requires no privileges or user interaction, increasing its risk profile.
Potential Impact
For European organizations, the impact of CVE-2024-20154 is substantial, particularly for sectors relying heavily on mobile communications such as telecommunications providers, critical infrastructure operators, government agencies, and enterprises with mobile workforces. Exploitation could allow attackers to intercept, manipulate, or disrupt mobile communications by executing arbitrary code on the modem, potentially leading to data breaches, espionage, or denial of service. The ability to remotely compromise devices without user interaction increases the threat surface, especially in urban or densely populated areas where rogue base stations can be deployed covertly. This vulnerability could undermine trust in mobile networks and impact services dependent on cellular connectivity. Additionally, compromised devices could be used as footholds for further network intrusion or lateral movement within organizational environments. The broad range of affected chipsets means many consumer and enterprise mobile devices in Europe are at risk, amplifying the potential scale of impact.
Mitigation Recommendations
1. Immediate application of vendor-provided patches or firmware updates for affected MediaTek modem chipsets is critical once available. Organizations should engage with device manufacturers and mobile network operators to ensure timely deployment. 2. Implement network-level defenses to detect and block rogue base stations, including the use of advanced radio monitoring tools and anomaly detection systems within cellular networks. 3. Employ mobile device management (MDM) solutions to enforce firmware update policies and monitor device integrity. 4. Educate security teams about the risks of rogue base stations and encourage vigilance in environments where sensitive communications occur. 5. Collaborate with telecom providers to enhance base station authentication and integrity verification mechanisms. 6. For critical infrastructure, consider deploying additional layers of encryption and multi-factor authentication to reduce the impact of potential modem compromise. 7. Monitor threat intelligence feeds for emerging exploit code or attack campaigns targeting this vulnerability to respond swiftly. 8. Conduct regular security assessments of mobile devices and network infrastructure to identify signs of compromise or anomalous behavior related to modem exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2023-11-02T13:35:35.189Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6994829080d747be20bad130
Added to database: 2/17/2026, 3:00:32 PM
Last enriched: 2/17/2026, 3:15:15 PM
Last updated: 2/21/2026, 12:16:35 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.