CVE-2025-20647: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721.
AI Analysis
Technical Summary
CVE-2025-20647 is a vulnerability identified in multiple MediaTek modem chipsets, including but not limited to MT2735, MT6739, MT6761, MT6765, MT6771, MT6785, MT6885, MT6895, MT6980, MT8675, MT8788, and others, spanning a broad range of mobile SoCs. The root cause is a NULL pointer dereference (CWE-476) resulting from a missing bounds check in the modem firmware, specifically affecting modem versions NR12A, NR13, NR15, and NR16. When a user equipment (UE) connects to a rogue base station controlled by an attacker, the modem processes malformed or unexpected data that triggers the NULL pointer dereference, causing the modem system to crash. This leads to a denial of service condition, disrupting mobile connectivity and potentially requiring a device reboot or manual intervention to restore service. The vulnerability does not require any user interaction or elevated privileges, making it remotely exploitable by an attacker capable of setting up a rogue base station within radio range of the target device. The CVSS v3.1 score is 6.5 (medium severity), reflecting the attack vector as adjacent network (the radio interface), low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. Although no public exploits are known, the widespread use of affected MediaTek chipsets in consumer and enterprise mobile devices increases the risk profile. The vendor has assigned patch IDs MOLY00791311 and MOLY01067019 to address the issue, underscoring the importance of firmware updates to remediate the vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20647 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This can disrupt critical communications, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, emergency services, transportation, and IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in public or strategic locations to cause widespread service outages or targeted disruptions. Although confidentiality and integrity are not directly affected, the loss of availability can degrade operational capabilities and customer trust. Enterprises with mobile workforce devices or embedded systems using these chipsets may experience intermittent connectivity failures, impacting productivity and service delivery. The lack of user interaction requirement and low complexity of exploitation increase the threat level in environments where physical proximity to targets is feasible. Additionally, mobile network operators may face increased support costs and reputational damage if large-scale outages occur due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-20647, European organizations should prioritize the following actions: 1) Identify all devices and embedded systems using affected MediaTek modem chipsets and verify their firmware versions against vendor advisories. 2) Apply the official patches MOLY00791311 and MOLY01067019 as soon as they become available from device manufacturers or MediaTek to address the NULL pointer dereference. 3) Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious radio signals within organizational premises, leveraging mobile threat defense solutions where applicable. 4) Educate mobile users and IT staff about the risks of connecting to untrusted networks and encourage the use of VPNs and secure communication channels. 5) Collaborate with mobile network operators to report and mitigate rogue base station activities in critical areas. 6) For IoT deployments, consider network segmentation and fallback connectivity options to maintain availability during potential modem failures. 7) Maintain an incident response plan that includes procedures for handling mobile device outages caused by modem crashes. These steps go beyond generic patching by incorporating proactive detection and response measures tailored to the unique attack vector of this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-20647: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
Description
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00791311 / MOLY01067019; Issue ID: MSV-2721.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20647 is a vulnerability identified in multiple MediaTek modem chipsets, including but not limited to MT2735, MT6739, MT6761, MT6765, MT6771, MT6785, MT6885, MT6895, MT6980, MT8675, MT8788, and others, spanning a broad range of mobile SoCs. The root cause is a NULL pointer dereference (CWE-476) resulting from a missing bounds check in the modem firmware, specifically affecting modem versions NR12A, NR13, NR15, and NR16. When a user equipment (UE) connects to a rogue base station controlled by an attacker, the modem processes malformed or unexpected data that triggers the NULL pointer dereference, causing the modem system to crash. This leads to a denial of service condition, disrupting mobile connectivity and potentially requiring a device reboot or manual intervention to restore service. The vulnerability does not require any user interaction or elevated privileges, making it remotely exploitable by an attacker capable of setting up a rogue base station within radio range of the target device. The CVSS v3.1 score is 6.5 (medium severity), reflecting the attack vector as adjacent network (the radio interface), low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. Although no public exploits are known, the widespread use of affected MediaTek chipsets in consumer and enterprise mobile devices increases the risk profile. The vendor has assigned patch IDs MOLY00791311 and MOLY01067019 to address the issue, underscoring the importance of firmware updates to remediate the vulnerability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20647 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This can disrupt critical communications, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, emergency services, transportation, and IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in public or strategic locations to cause widespread service outages or targeted disruptions. Although confidentiality and integrity are not directly affected, the loss of availability can degrade operational capabilities and customer trust. Enterprises with mobile workforce devices or embedded systems using these chipsets may experience intermittent connectivity failures, impacting productivity and service delivery. The lack of user interaction requirement and low complexity of exploitation increase the threat level in environments where physical proximity to targets is feasible. Additionally, mobile network operators may face increased support costs and reputational damage if large-scale outages occur due to this vulnerability.
Mitigation Recommendations
To mitigate CVE-2025-20647, European organizations should prioritize the following actions: 1) Identify all devices and embedded systems using affected MediaTek modem chipsets and verify their firmware versions against vendor advisories. 2) Apply the official patches MOLY00791311 and MOLY01067019 as soon as they become available from device manufacturers or MediaTek to address the NULL pointer dereference. 3) Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious radio signals within organizational premises, leveraging mobile threat defense solutions where applicable. 4) Educate mobile users and IT staff about the risks of connecting to untrusted networks and encourage the use of VPNs and secure communication channels. 5) Collaborate with mobile network operators to report and mitigate rogue base station activities in critical areas. 6) For IoT deployments, consider network segmentation and fallback connectivity options to maintain availability during potential modem failures. 7) Maintain an incident response plan that includes procedures for handling mobile device outages caused by modem crashes. These steps go beyond generic patching by incorporating proactive detection and response measures tailored to the unique attack vector of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.365Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6994829080d747be20bad139
Added to database: 2/17/2026, 3:00:32 PM
Last enriched: 2/17/2026, 3:15:49 PM
Last updated: 4/3/2026, 10:04:23 PM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.