CVE-2025-20659: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863
CVE-2025-20659 is an out-of-bounds read vulnerability (CWE-125) affecting a wide range of MediaTek modem chipsets. The flaw arises from improper input validation in the modem firmware, which can be triggered remotely if a user equipment (UE) connects to a rogue base station controlled by an attacker. Exploitation requires no user interaction or additional privileges and can cause a system crash, resulting in a denial of service (DoS) condition. The vulnerability impacts modem versions LR12A through NR17R and has a CVSS score of 6. 5 (medium severity). Although no known exploits are currently in the wild, the broad chipset coverage and ease of triggering the crash make this a significant risk. European organizations relying on devices with these MediaTek chipsets, especially in telecommunications and IoT sectors, could face service disruptions. Mitigation involves applying vendor patches promptly and monitoring for rogue base stations. Countries with high mobile device usage and critical telecom infrastructure are most at risk.
AI Analysis
Technical Summary
CVE-2025-20659 is an out-of-bounds read vulnerability classified under CWE-125 that affects numerous MediaTek modem chipsets, including models MT2735 through MT8863. The root cause is improper input validation within the modem firmware, which can be exploited remotely without requiring user interaction or elevated privileges. An attacker controlling a rogue base station can induce the vulnerable UE to process malformed input, leading to a system crash and denial of service. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability's CVSS 3.1 score is 6.5, indicating a medium severity level, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability, as confidentiality and integrity are not affected. No public exploits are known yet, but the extensive range of affected chipsets and the lack of required user interaction increase the risk profile. The vulnerability can disrupt mobile communications and IoT devices relying on these modems, potentially affecting service continuity. MediaTek has assigned Patch ID MOLY01519028 to address this issue, though patch deployment timelines may vary across device manufacturers.
Potential Impact
For European organizations, the primary impact of CVE-2025-20659 is the potential for remote denial of service on devices using affected MediaTek modems. This can lead to temporary loss of connectivity in mobile phones, IoT devices, and embedded systems, disrupting business operations, especially in sectors dependent on continuous mobile communications such as logistics, healthcare, and critical infrastructure. Telecommunications providers may experience increased customer complaints and service degradation if rogue base stations are deployed by malicious actors. The vulnerability could be exploited in targeted attacks against high-value assets or to cause widespread disruption in areas with dense mobile device usage. Given the widespread adoption of MediaTek chipsets in budget and mid-range devices popular in Europe, the scope of affected endpoints is significant. However, the lack of confidentiality or integrity impact limits data breach risks. The ease of exploitation without user interaction increases the threat, especially in urban environments where rogue base stations can be covertly deployed.
Mitigation Recommendations
1. Immediate deployment of the vendor-provided patch (MOLY01519028) across all affected devices and modems is critical. Coordinate with device manufacturers and mobile network operators to ensure timely updates. 2. Implement network-level detection and mitigation strategies to identify and block rogue base stations, including the use of radio frequency monitoring tools and anomaly detection systems. 3. Encourage users and administrators to update device firmware regularly and verify the authenticity of network connections. 4. For enterprise IoT deployments, segment networks to isolate vulnerable devices and limit exposure to untrusted wireless environments. 5. Collaborate with telecom providers to enhance base station authentication mechanisms and reduce the risk of rogue station exploitation. 6. Monitor network traffic for unusual patterns indicative of attempted exploitation or service disruption. 7. Educate security teams about this specific threat to improve incident response readiness. 8. Consider deploying endpoint detection solutions capable of identifying modem crashes or abnormal behavior related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-20659: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863
Description
CVE-2025-20659 is an out-of-bounds read vulnerability (CWE-125) affecting a wide range of MediaTek modem chipsets. The flaw arises from improper input validation in the modem firmware, which can be triggered remotely if a user equipment (UE) connects to a rogue base station controlled by an attacker. Exploitation requires no user interaction or additional privileges and can cause a system crash, resulting in a denial of service (DoS) condition. The vulnerability impacts modem versions LR12A through NR17R and has a CVSS score of 6. 5 (medium severity). Although no known exploits are currently in the wild, the broad chipset coverage and ease of triggering the crash make this a significant risk. European organizations relying on devices with these MediaTek chipsets, especially in telecommunications and IoT sectors, could face service disruptions. Mitigation involves applying vendor patches promptly and monitoring for rogue base stations. Countries with high mobile device usage and critical telecom infrastructure are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-20659 is an out-of-bounds read vulnerability classified under CWE-125 that affects numerous MediaTek modem chipsets, including models MT2735 through MT8863. The root cause is improper input validation within the modem firmware, which can be exploited remotely without requiring user interaction or elevated privileges. An attacker controlling a rogue base station can induce the vulnerable UE to process malformed input, leading to a system crash and denial of service. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability's CVSS 3.1 score is 6.5, indicating a medium severity level, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability, as confidentiality and integrity are not affected. No public exploits are known yet, but the extensive range of affected chipsets and the lack of required user interaction increase the risk profile. The vulnerability can disrupt mobile communications and IoT devices relying on these modems, potentially affecting service continuity. MediaTek has assigned Patch ID MOLY01519028 to address this issue, though patch deployment timelines may vary across device manufacturers.
Potential Impact
For European organizations, the primary impact of CVE-2025-20659 is the potential for remote denial of service on devices using affected MediaTek modems. This can lead to temporary loss of connectivity in mobile phones, IoT devices, and embedded systems, disrupting business operations, especially in sectors dependent on continuous mobile communications such as logistics, healthcare, and critical infrastructure. Telecommunications providers may experience increased customer complaints and service degradation if rogue base stations are deployed by malicious actors. The vulnerability could be exploited in targeted attacks against high-value assets or to cause widespread disruption in areas with dense mobile device usage. Given the widespread adoption of MediaTek chipsets in budget and mid-range devices popular in Europe, the scope of affected endpoints is significant. However, the lack of confidentiality or integrity impact limits data breach risks. The ease of exploitation without user interaction increases the threat, especially in urban environments where rogue base stations can be covertly deployed.
Mitigation Recommendations
1. Immediate deployment of the vendor-provided patch (MOLY01519028) across all affected devices and modems is critical. Coordinate with device manufacturers and mobile network operators to ensure timely updates. 2. Implement network-level detection and mitigation strategies to identify and block rogue base stations, including the use of radio frequency monitoring tools and anomaly detection systems. 3. Encourage users and administrators to update device firmware regularly and verify the authenticity of network connections. 4. For enterprise IoT deployments, segment networks to isolate vulnerable devices and limit exposure to untrusted wireless environments. 5. Collaborate with telecom providers to enhance base station authentication mechanisms and reduce the risk of rogue station exploitation. 6. Monitor network traffic for unusual patterns indicative of attempted exploitation or service disruption. 7. Educate security teams about this specific threat to improve incident response readiness. 8. Consider deploying endpoint detection solutions capable of identifying modem crashes or abnormal behavior related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.367Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6994829080d747be20bad13c
Added to database: 2/17/2026, 3:00:32 PM
Last enriched: 2/17/2026, 3:15:28 PM
Last updated: 2/17/2026, 5:13:40 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2617: Insecure Default Initialization of Resource in Beetel 777VR1
MediumCVE-2025-70830: n/a
HighCVE-2025-70828: n/a
CriticalHackers Offer to Sell Millions of Eurail User Records
MediumCVE-2026-2616: Hard-coded Credentials in Beetel 777VR1
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.