Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20634: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8676, MT8678, MT8795T, MT8798, MT8863

0
High
VulnerabilityCVE-2025-20634cvecve-2025-20634cwe-787
Published: Mon Feb 03 2025 (02/03/2025, 03:23:49 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8676, MT8678, MT8795T, MT8798, MT8863

Description

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436.

AI-Powered Analysis

AILast updated: 02/17/2026, 15:14:57 UTC

Technical Analysis

CVE-2025-20634 is a vulnerability classified under CWE-787 (Out-of-bounds Write) found in the modem firmware of a wide range of MediaTek chipsets including MT2737, MT6813, MT6835 series, MT6878 series, MT6895 series, MT6980 series, MT6983 series, MT6985 series, MT6989 series, MT6990, MT6991, MT8673, MT8676, MT8678, MT8795T, MT8798, and MT8863. The issue stems from a missing bounds check in the modem's code, which allows an attacker controlling a rogue base station to send specially crafted signals that cause the modem to write data outside the intended memory boundaries. This out-of-bounds write can lead to remote code execution on the modem, compromising the device's confidentiality, integrity, and availability. The vulnerability affects modem firmware versions NR16, NR17, and NR17R. Exploitation does not require user interaction or any privileges, making it feasible to attack devices silently when they connect to a malicious base station. The vulnerability was published on February 3, 2025, with a CVSS v3.1 score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating a high-severity remote attack vector with no privileges or user interaction needed. Although no exploits are currently known in the wild, the potential for impactful attacks on mobile devices and IoT equipment using these chipsets is significant. The vendor has assigned a patch ID (MOLY01289384) and issue ID (MSV-2436), but no public patch links are currently available. This vulnerability is particularly critical because it targets the modem firmware, a core component responsible for cellular communications, and could be leveraged to compromise device security at a fundamental level.

Potential Impact

For European organizations, the impact of CVE-2025-20634 is substantial. Devices using affected MediaTek chipsets are widespread in smartphones, IoT devices, and embedded systems, many of which are integral to enterprise operations and critical infrastructure. Successful exploitation could allow attackers to execute arbitrary code remotely on the modem, potentially leading to interception or manipulation of communications, device takeover, and disruption of services. This threatens confidentiality by exposing sensitive data transmitted over cellular networks, integrity by allowing malicious code execution, and availability by causing device or network outages. Telecommunications providers, mobile network operators, and industries relying on cellular connectivity (e.g., manufacturing, transportation, healthcare) are particularly vulnerable. The ability to exploit this vulnerability without user interaction or privileges increases the risk of large-scale attacks, especially in environments where rogue base stations could be deployed. European countries with advanced telecom infrastructure and high mobile device penetration face elevated risks, potentially impacting national security and economic stability.

Mitigation Recommendations

To mitigate CVE-2025-20634, European organizations should prioritize the following actions: 1) Monitor MediaTek and device vendors for official patches corresponding to patch ID MOLY01289384 and apply them promptly to all affected devices and firmware versions (NR16, NR17, NR17R). 2) Implement network-level defenses to detect and block rogue base stations, including enhanced base station authentication and anomaly detection systems within mobile network infrastructure. 3) Employ mobile device management (MDM) solutions to inventory devices with affected chipsets and enforce timely updates. 4) Educate users and administrators about the risks of connecting to untrusted cellular networks, especially in sensitive environments. 5) Collaborate with telecom providers to enhance monitoring for suspicious base station activity and coordinate incident response. 6) For critical IoT deployments, consider network segmentation and fallback communication methods to reduce exposure. 7) Engage in threat intelligence sharing within industry groups to stay informed about emerging exploits or attack campaigns targeting this vulnerability. These measures go beyond generic patching by emphasizing detection, prevention of rogue infrastructure, and operational readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.362Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994829080d747be20bad133

Added to database: 2/17/2026, 3:00:32 PM

Last enriched: 2/17/2026, 3:14:57 PM

Last updated: 2/20/2026, 10:59:06 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats