CVE-2025-20666: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8667, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00650610; Issue ID: MSV-2933.
AI Analysis
Technical Summary
CVE-2025-20666 is a high-severity vulnerability identified in multiple MediaTek modem chipsets, including models MT2735, MT6833, MT6853, MT6873, MT6880, MT6890, MT8666, MT8673, MT8771, MT8791, and others. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion in the modem firmware can be triggered improperly, leading to an uncaught exception and subsequent system crash. This flaw exists in the modem's NR15 version and can be exploited remotely without requiring any user interaction or prior authentication. The attack vector involves a user equipment (UE) device connecting to a rogue base station controlled by an attacker. Upon connection, the attacker can send specially crafted signals or messages that trigger the assertion failure, causing the modem to crash and resulting in a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, reflecting the vulnerability's high impact on availability with no impact on confidentiality or integrity. The vulnerability does not grant additional execution privileges but disrupts normal modem operation, potentially causing service outages or device reboots. No known exploits are currently reported in the wild, and MediaTek has assigned a patch ID (MOLY00650610) to address the issue. The vulnerability affects a broad range of MediaTek modem chipsets widely used in mobile devices, IoT equipment, and embedded systems, making it a significant concern for network reliability and device stability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20666 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt critical communications, especially in sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in proximity to target devices, causing widespread service interruptions without requiring device user interaction. This poses risks to operational continuity, particularly for enterprises with remote or mobile workforces and for organizations deploying 5G or LTE-based IoT infrastructure. Additionally, denial of service in communication devices may indirectly affect data availability and business processes dependent on network connectivity. While no direct data breach or privilege escalation is involved, the disruption of service could lead to financial losses, reputational damage, and safety concerns in critical infrastructure sectors.
Mitigation Recommendations
To mitigate CVE-2025-20666, European organizations should: 1) Ensure all devices using affected MediaTek modems are updated promptly with the official patch (MOLY00650610) provided by MediaTek or device manufacturers. 2) Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious radio signals indicative of attack attempts. 3) Employ mobile device management (MDM) solutions to enforce firmware updates and maintain device security hygiene. 4) For critical infrastructure, consider deploying network-level protections such as base station authentication and anomaly detection systems to prevent unauthorized base station connections. 5) Educate IT and security teams about the threat vector to recognize symptoms of modem crashes and service disruptions. 6) Collaborate with telecom providers to ensure network-level mitigations and rapid incident response capabilities. 7) For IoT deployments, isolate vulnerable devices in segmented network zones to limit impact scope. These steps go beyond generic patching by emphasizing detection, network defense, and operational preparedness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20666: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8667, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00650610; Issue ID: MSV-2933.
AI-Powered Analysis
Technical Analysis
CVE-2025-20666 is a high-severity vulnerability identified in multiple MediaTek modem chipsets, including models MT2735, MT6833, MT6853, MT6873, MT6880, MT6890, MT8666, MT8673, MT8771, MT8791, and others. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion in the modem firmware can be triggered improperly, leading to an uncaught exception and subsequent system crash. This flaw exists in the modem's NR15 version and can be exploited remotely without requiring any user interaction or prior authentication. The attack vector involves a user equipment (UE) device connecting to a rogue base station controlled by an attacker. Upon connection, the attacker can send specially crafted signals or messages that trigger the assertion failure, causing the modem to crash and resulting in a denial of service (DoS) condition. The CVSS v3.1 base score is 7.5, reflecting the vulnerability's high impact on availability with no impact on confidentiality or integrity. The vulnerability does not grant additional execution privileges but disrupts normal modem operation, potentially causing service outages or device reboots. No known exploits are currently reported in the wild, and MediaTek has assigned a patch ID (MOLY00650610) to address the issue. The vulnerability affects a broad range of MediaTek modem chipsets widely used in mobile devices, IoT equipment, and embedded systems, making it a significant concern for network reliability and device stability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20666 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt critical communications, especially in sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in proximity to target devices, causing widespread service interruptions without requiring device user interaction. This poses risks to operational continuity, particularly for enterprises with remote or mobile workforces and for organizations deploying 5G or LTE-based IoT infrastructure. Additionally, denial of service in communication devices may indirectly affect data availability and business processes dependent on network connectivity. While no direct data breach or privilege escalation is involved, the disruption of service could lead to financial losses, reputational damage, and safety concerns in critical infrastructure sectors.
Mitigation Recommendations
To mitigate CVE-2025-20666, European organizations should: 1) Ensure all devices using affected MediaTek modems are updated promptly with the official patch (MOLY00650610) provided by MediaTek or device manufacturers. 2) Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious radio signals indicative of attack attempts. 3) Employ mobile device management (MDM) solutions to enforce firmware updates and maintain device security hygiene. 4) For critical infrastructure, consider deploying network-level protections such as base station authentication and anomaly detection systems to prevent unauthorized base station connections. 5) Educate IT and security teams about the threat vector to recognize symptoms of modem crashes and service disruptions. 6) Collaborate with telecom providers to ensure network-level mitigations and rapid incident response capabilities. 7) For IoT deployments, isolate vulnerable devices in segmented network zones to limit impact scope. These steps go beyond generic patching by emphasizing detection, network defense, and operational preparedness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6a75
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:18:12 AM
Last updated: 11/22/2025, 7:38:56 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.