CVE-2025-20644: CWE-1286 Syntactic Correctness in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798
In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.
AI Analysis
Technical Summary
CVE-2025-20644 is a vulnerability identified in MediaTek modem chipsets including models MT2735 through MT8798, affecting modem firmware versions NR15 and NR16. The root cause is improper error handling in the modem's software, which can lead to memory corruption when processing certain inputs from the cellular network. An attacker controlling a rogue base station can exploit this flaw by inducing a connected user equipment (UE) device to process malformed messages, triggering memory corruption that results in a denial of service (DoS) condition. This DoS manifests as modem crashes or loss of connectivity, disrupting the device's cellular communication capabilities. The vulnerability does not require any privileges or user interaction, making it easier to exploit in environments where an attacker can operate a rogue base station. The CVSS v3.1 score is 6.5 (medium severity), reflecting the lack of confidentiality or integrity impact but significant availability impact. MediaTek has assigned a patch ID MOLY01525673 to address this issue. Although no exploits have been reported in the wild, the widespread use of these chipsets in mobile devices globally, including Europe, makes this a relevant threat. The CWE-1286 classification indicates a syntactic correctness issue related to error handling in the modem firmware.
Potential Impact
For European organizations, the primary impact is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting employees' ability to connect to cellular networks, potentially impacting business operations reliant on mobile connectivity. Telecom operators and critical infrastructure providers using devices with these chipsets could experience service degradation or outages if targeted by attackers deploying rogue base stations. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by causing persistent connectivity failures. While no direct data breach or code execution is indicated, availability loss in mobile communications can have cascading effects on operational continuity, emergency services, and IoT deployments. The ease of exploitation without user interaction increases the risk in environments where attackers can deploy rogue base stations, such as urban areas or events with high device density.
Mitigation Recommendations
Organizations should prioritize applying the official patches from MediaTek as soon as they become available to affected devices and firmware versions NR15 and NR16. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Mobile device management (MDM) solutions can be used to enforce firmware updates and monitor device connectivity health. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability or ensure fallback mechanisms are in place to maintain connectivity if a modem is disrupted. Security teams should educate users about the risks of connecting to unknown cellular networks and implement policies to restrict device connectivity to trusted networks where feasible. Collaboration with telecom providers to share threat intelligence about rogue base station activity can further reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20644: CWE-1286 Syntactic Correctness in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798
Description
In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20644 is a vulnerability identified in MediaTek modem chipsets including models MT2735 through MT8798, affecting modem firmware versions NR15 and NR16. The root cause is improper error handling in the modem's software, which can lead to memory corruption when processing certain inputs from the cellular network. An attacker controlling a rogue base station can exploit this flaw by inducing a connected user equipment (UE) device to process malformed messages, triggering memory corruption that results in a denial of service (DoS) condition. This DoS manifests as modem crashes or loss of connectivity, disrupting the device's cellular communication capabilities. The vulnerability does not require any privileges or user interaction, making it easier to exploit in environments where an attacker can operate a rogue base station. The CVSS v3.1 score is 6.5 (medium severity), reflecting the lack of confidentiality or integrity impact but significant availability impact. MediaTek has assigned a patch ID MOLY01525673 to address this issue. Although no exploits have been reported in the wild, the widespread use of these chipsets in mobile devices globally, including Europe, makes this a relevant threat. The CWE-1286 classification indicates a syntactic correctness issue related to error handling in the modem firmware.
Potential Impact
For European organizations, the primary impact is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting employees' ability to connect to cellular networks, potentially impacting business operations reliant on mobile connectivity. Telecom operators and critical infrastructure providers using devices with these chipsets could experience service degradation or outages if targeted by attackers deploying rogue base stations. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by causing persistent connectivity failures. While no direct data breach or code execution is indicated, availability loss in mobile communications can have cascading effects on operational continuity, emergency services, and IoT deployments. The ease of exploitation without user interaction increases the risk in environments where attackers can deploy rogue base stations, such as urban areas or events with high device density.
Mitigation Recommendations
Organizations should prioritize applying the official patches from MediaTek as soon as they become available to affected devices and firmware versions NR15 and NR16. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Mobile device management (MDM) solutions can be used to enforce firmware updates and monitor device connectivity health. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability or ensure fallback mechanisms are in place to maintain connectivity if a modem is disrupted. Security teams should educate users about the risks of connecting to unknown cellular networks and implement policies to restrict device connectivity to trusted networks where feasible. Collaboration with telecom providers to share threat intelligence about rogue base station activity can further reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.365Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6994829080d747be20bad136
Added to database: 2/17/2026, 3:00:32 PM
Last enriched: 2/17/2026, 3:16:03 PM
Last updated: 4/3/2026, 10:08:10 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.