Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20659: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863

0
Medium
VulnerabilityCVE-2025-20659cvecve-2025-20659cwe-125
Published: Mon Apr 07 2025 (04/07/2025, 03:14:54 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863

Description

CVE-2025-20659 is an out-of-bounds read vulnerability (CWE-125) affecting a wide range of MediaTek modem chipsets. The flaw arises from improper input validation in the modem firmware, which can be triggered remotely if a user equipment (UE) connects to a rogue base station controlled by an attacker. Exploitation requires no user interaction or additional privileges and can cause a system crash, resulting in a denial of service (DoS) condition. The vulnerability impacts modem versions LR12A through NR17R and has a CVSS score of 6. 5 (medium severity). Although no known exploits are currently in the wild, the broad chipset coverage and ease of triggering the crash make this a significant risk. European organizations relying on devices with these MediaTek chipsets, especially in telecommunications and IoT sectors, could face service disruptions. Mitigation involves applying vendor patches promptly and monitoring for rogue base stations. Countries with high mobile device usage and critical telecom infrastructure are most at risk.

AI-Powered Analysis

AILast updated: 02/17/2026, 15:15:28 UTC

Technical Analysis

CVE-2025-20659 is an out-of-bounds read vulnerability classified under CWE-125 that affects numerous MediaTek modem chipsets, including models MT2735 through MT8863. The root cause is improper input validation within the modem firmware, which can be exploited remotely without requiring user interaction or elevated privileges. An attacker controlling a rogue base station can induce the vulnerable UE to process malformed input, leading to a system crash and denial of service. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability's CVSS 3.1 score is 6.5, indicating a medium severity level, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability, as confidentiality and integrity are not affected. No public exploits are known yet, but the extensive range of affected chipsets and the lack of required user interaction increase the risk profile. The vulnerability can disrupt mobile communications and IoT devices relying on these modems, potentially affecting service continuity. MediaTek has assigned Patch ID MOLY01519028 to address this issue, though patch deployment timelines may vary across device manufacturers.

Potential Impact

For European organizations, the primary impact of CVE-2025-20659 is the potential for remote denial of service on devices using affected MediaTek modems. This can lead to temporary loss of connectivity in mobile phones, IoT devices, and embedded systems, disrupting business operations, especially in sectors dependent on continuous mobile communications such as logistics, healthcare, and critical infrastructure. Telecommunications providers may experience increased customer complaints and service degradation if rogue base stations are deployed by malicious actors. The vulnerability could be exploited in targeted attacks against high-value assets or to cause widespread disruption in areas with dense mobile device usage. Given the widespread adoption of MediaTek chipsets in budget and mid-range devices popular in Europe, the scope of affected endpoints is significant. However, the lack of confidentiality or integrity impact limits data breach risks. The ease of exploitation without user interaction increases the threat, especially in urban environments where rogue base stations can be covertly deployed.

Mitigation Recommendations

1. Immediate deployment of the vendor-provided patch (MOLY01519028) across all affected devices and modems is critical. Coordinate with device manufacturers and mobile network operators to ensure timely updates. 2. Implement network-level detection and mitigation strategies to identify and block rogue base stations, including the use of radio frequency monitoring tools and anomaly detection systems. 3. Encourage users and administrators to update device firmware regularly and verify the authenticity of network connections. 4. For enterprise IoT deployments, segment networks to isolate vulnerable devices and limit exposure to untrusted wireless environments. 5. Collaborate with telecom providers to enhance base station authentication mechanisms and reduce the risk of rogue station exploitation. 6. Monitor network traffic for unusual patterns indicative of attempted exploitation or service disruption. 7. Educate security teams about this specific threat to improve incident response readiness. 8. Consider deploying endpoint detection solutions capable of identifying modem crashes or abnormal behavior related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.367Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6994829080d747be20bad13c

Added to database: 2/17/2026, 3:00:32 PM

Last enriched: 2/17/2026, 3:15:28 PM

Last updated: 2/17/2026, 5:13:40 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats