Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20644: CWE-1286 Syntactic Correctness in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798

0
Medium
VulnerabilityCVE-2025-20644cvecve-2025-20644cwe-1286
Published: Mon Mar 03 2025 (03/03/2025, 02:25:27 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798

Description

CVE-2025-20644 is a medium severity vulnerability affecting numerous MediaTek modem chipsets, caused by improper error handling leading to memory corruption. Exploitation requires no user interaction and no privileges, but the attacker must operate a rogue base station to which the victim's device connects. The vulnerability can cause a remote denial of service (DoS) by crashing or destabilizing the modem. It affects modem versions NR15 and NR16 across a wide range of MediaTek SoCs used in mobile devices. There are no known exploits in the wild yet, and a patch has been identified by MediaTek. European organizations relying on devices with these chipsets could face service disruptions, especially in telecom and critical infrastructure sectors. Mitigation involves applying vendor patches promptly and monitoring for rogue base stations in network environments. Countries with high adoption of MediaTek-based mobile devices and advanced telecom infrastructure are most at risk.

AI-Powered Analysis

AILast updated: 02/17/2026, 15:16:03 UTC

Technical Analysis

CVE-2025-20644 is a vulnerability identified in MediaTek modem chipsets including models MT2735 through MT8798, affecting modem firmware versions NR15 and NR16. The root cause is improper error handling in the modem's software, which can lead to memory corruption when processing certain inputs from the cellular network. An attacker controlling a rogue base station can exploit this flaw by inducing a connected user equipment (UE) device to process malformed messages, triggering memory corruption that results in a denial of service (DoS) condition. This DoS manifests as modem crashes or loss of connectivity, disrupting the device's cellular communication capabilities. The vulnerability does not require any privileges or user interaction, making it easier to exploit in environments where an attacker can operate a rogue base station. The CVSS v3.1 score is 6.5 (medium severity), reflecting the lack of confidentiality or integrity impact but significant availability impact. MediaTek has assigned a patch ID MOLY01525673 to address this issue. Although no exploits have been reported in the wild, the widespread use of these chipsets in mobile devices globally, including Europe, makes this a relevant threat. The CWE-1286 classification indicates a syntactic correctness issue related to error handling in the modem firmware.

Potential Impact

For European organizations, the primary impact is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting employees' ability to connect to cellular networks, potentially impacting business operations reliant on mobile connectivity. Telecom operators and critical infrastructure providers using devices with these chipsets could experience service degradation or outages if targeted by attackers deploying rogue base stations. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by causing persistent connectivity failures. While no direct data breach or code execution is indicated, availability loss in mobile communications can have cascading effects on operational continuity, emergency services, and IoT deployments. The ease of exploitation without user interaction increases the risk in environments where attackers can deploy rogue base stations, such as urban areas or events with high device density.

Mitigation Recommendations

Organizations should prioritize applying the official patches from MediaTek as soon as they become available to affected devices and firmware versions NR15 and NR16. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Mobile device management (MDM) solutions can be used to enforce firmware updates and monitor device connectivity health. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability or ensure fallback mechanisms are in place to maintain connectivity if a modem is disrupted. Security teams should educate users about the risks of connecting to unknown cellular networks and implement policies to restrict device connectivity to trusted networks where feasible. Collaboration with telecom providers to share threat intelligence about rogue base station activity can further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.365Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994829080d747be20bad136

Added to database: 2/17/2026, 3:00:32 PM

Last enriched: 2/17/2026, 3:16:03 PM

Last updated: 2/17/2026, 5:15:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats