Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20647: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798

0
Medium
VulnerabilityCVE-2025-20647cvecve-2025-20647cwe-476
Published: Mon Mar 03 2025 (03/03/2025, 02:25:32 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798

Description

CVE-2025-20647 is a medium severity vulnerability affecting numerous MediaTek modem chipsets, caused by a NULL pointer dereference due to missing bounds checks. Exploitation can lead to a remote denial of service (DoS) without requiring user interaction or elevated privileges. The attack vector involves a user equipment (UE) connecting to a rogue base station controlled by an attacker, causing the modem system to crash. This vulnerability impacts modem versions NR12A, NR13, NR15, and NR16 across a wide range of MediaTek SoCs commonly used in mobile devices. While no known exploits are currently in the wild, the potential for service disruption is significant, especially for mobile network operators and end users relying on affected devices. A patch has been identified but not linked, emphasizing the need for timely updates. European organizations using devices with these chipsets may face service availability issues, particularly in sectors dependent on mobile connectivity. Mitigation requires applying vendor patches promptly and monitoring network connections for rogue base stations. Countries with high adoption of MediaTek-based mobile devices and critical mobile infrastructure are most at risk.

AI-Powered Analysis

AILast updated: 02/17/2026, 15:15:49 UTC

Technical Analysis

CVE-2025-20647 is a vulnerability identified in multiple MediaTek modem chipsets, including but not limited to MT2735, MT6739, MT6761, MT6765, MT6771, MT6785, MT6885, MT6895, MT6980, MT8675, MT8788, and others, spanning a broad range of mobile SoCs. The root cause is a NULL pointer dereference (CWE-476) resulting from a missing bounds check in the modem firmware, specifically affecting modem versions NR12A, NR13, NR15, and NR16. When a user equipment (UE) connects to a rogue base station controlled by an attacker, the modem processes malformed or unexpected data that triggers the NULL pointer dereference, causing the modem system to crash. This leads to a denial of service condition, disrupting mobile connectivity and potentially requiring a device reboot or manual intervention to restore service. The vulnerability does not require any user interaction or elevated privileges, making it remotely exploitable by an attacker capable of setting up a rogue base station within radio range of the target device. The CVSS v3.1 score is 6.5 (medium severity), reflecting the attack vector as adjacent network (the radio interface), low attack complexity, no privileges required, no user interaction, unchanged scope, no impact on confidentiality or integrity, but high impact on availability. Although no public exploits are known, the widespread use of affected MediaTek chipsets in consumer and enterprise mobile devices increases the risk profile. The vendor has assigned patch IDs MOLY00791311 and MOLY01067019 to address the issue, underscoring the importance of firmware updates to remediate the vulnerability.

Potential Impact

For European organizations, the primary impact of CVE-2025-20647 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This can disrupt critical communications, especially for sectors relying heavily on mobile connectivity such as telecommunications providers, emergency services, transportation, and IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in public or strategic locations to cause widespread service outages or targeted disruptions. Although confidentiality and integrity are not directly affected, the loss of availability can degrade operational capabilities and customer trust. Enterprises with mobile workforce devices or embedded systems using these chipsets may experience intermittent connectivity failures, impacting productivity and service delivery. The lack of user interaction requirement and low complexity of exploitation increase the threat level in environments where physical proximity to targets is feasible. Additionally, mobile network operators may face increased support costs and reputational damage if large-scale outages occur due to this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-20647, European organizations should prioritize the following actions: 1) Identify all devices and embedded systems using affected MediaTek modem chipsets and verify their firmware versions against vendor advisories. 2) Apply the official patches MOLY00791311 and MOLY01067019 as soon as they become available from device manufacturers or MediaTek to address the NULL pointer dereference. 3) Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious radio signals within organizational premises, leveraging mobile threat defense solutions where applicable. 4) Educate mobile users and IT staff about the risks of connecting to untrusted networks and encourage the use of VPNs and secure communication channels. 5) Collaborate with mobile network operators to report and mitigate rogue base station activities in critical areas. 6) For IoT deployments, consider network segmentation and fallback connectivity options to maintain availability during potential modem failures. 7) Maintain an incident response plan that includes procedures for handling mobile device outages caused by modem crashes. These steps go beyond generic patching by incorporating proactive detection and response measures tailored to the unique attack vector of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.365Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994829080d747be20bad139

Added to database: 2/17/2026, 3:00:32 PM

Last enriched: 2/17/2026, 3:15:49 PM

Last updated: 2/17/2026, 5:15:37 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats