CVE-2025-20667: CWE-326 Inadequate Encryption Strength in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
AI Analysis
Technical Summary
CVE-2025-20667 is a high-severity vulnerability affecting a wide range of MediaTek modem chipsets, including models MT2735 through MT8797, covering many popular mobile SoCs used in smartphones and IoT devices. The vulnerability is categorized under CWE-326, indicating inadequate encryption strength. Specifically, the issue arises from incorrect error handling within the modem firmware, which can lead to information disclosure. An attacker controlling a rogue base station can exploit this flaw to remotely extract sensitive information from a user equipment (UE) device without requiring any additional execution privileges, user interaction, or authentication. The affected modem versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability has a CVSS 3.1 score of 7.5 (high), reflecting its potential impact on confidentiality with no impact on integrity or availability. The attack vector is network-based (remote), with low attack complexity and no privileges or user interaction needed. This means that any UE connecting to a malicious base station could be compromised to leak sensitive data. The flaw stems from weak encryption or improper cryptographic error handling in the modem’s communication protocols, which are critical for securing cellular network interactions. Although no known exploits are currently reported in the wild, the broad range of affected chipsets and the ease of exploitation make this a significant threat. The vendor has reserved the issue and assigned a patch ID (MOLY01513293), indicating that a fix is or will be available. This vulnerability highlights the risks inherent in cellular modem firmware, which is often less scrutinized than application-layer software but is a critical attack surface for mobile devices.
Potential Impact
For European organizations, the impact of CVE-2025-20667 can be substantial, especially for those relying on mobile communications for sensitive operations or using devices with MediaTek chipsets. The vulnerability enables attackers to remotely disclose sensitive information from devices connected to rogue base stations, which could include location data, subscriber identity, or other confidential information transmitted over the cellular network. This threatens the confidentiality of communications and could facilitate further targeted attacks, espionage, or data leakage. Enterprises with mobile workforces, IoT deployments, or critical infrastructure relying on cellular connectivity are at risk. The lack of required user interaction or privileges means that devices can be compromised silently, increasing the risk of undetected data breaches. Additionally, the vulnerability could undermine trust in mobile network security, impacting sectors such as finance, healthcare, and government services that depend on secure mobile communications. Given the widespread use of MediaTek chipsets in affordable smartphones popular in Europe, a large number of devices could be vulnerable, potentially affecting both corporate and consumer users. The threat also poses risks to mobile network operators and service providers who must guard against rogue base stations within their networks or geographic regions.
Mitigation Recommendations
To mitigate CVE-2025-20667, European organizations should take a multi-layered approach: 1) Ensure that all devices using affected MediaTek chipsets receive and apply firmware updates or patches from device manufacturers or carriers as soon as they become available. Coordination with vendors to confirm patch deployment is critical. 2) Mobile network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying advanced radio frequency monitoring tools and anomaly detection systems to identify unauthorized or suspicious base stations within their coverage areas. 3) Organizations should implement mobile device management (MDM) solutions that can enforce security policies, monitor device integrity, and restrict connections to untrusted networks. 4) For high-risk environments, consider using devices with modems from vendors with stronger security track records or additional hardware security features. 5) Educate users about the risks of connecting to unknown or untrusted cellular networks, although user interaction is not required for exploitation, awareness can help in some scenarios. 6) Network segmentation and encryption at higher communication layers (e.g., VPNs, application-layer encryption) can reduce the impact of any data leakage from the modem layer. 7) Collaborate with national cybersecurity agencies and telecom regulators to promote best practices and rapid incident response to rogue base station threats.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2025-20667: CWE-326 Inadequate Encryption Strength in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
AI-Powered Analysis
Technical Analysis
CVE-2025-20667 is a high-severity vulnerability affecting a wide range of MediaTek modem chipsets, including models MT2735 through MT8797, covering many popular mobile SoCs used in smartphones and IoT devices. The vulnerability is categorized under CWE-326, indicating inadequate encryption strength. Specifically, the issue arises from incorrect error handling within the modem firmware, which can lead to information disclosure. An attacker controlling a rogue base station can exploit this flaw to remotely extract sensitive information from a user equipment (UE) device without requiring any additional execution privileges, user interaction, or authentication. The affected modem versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability has a CVSS 3.1 score of 7.5 (high), reflecting its potential impact on confidentiality with no impact on integrity or availability. The attack vector is network-based (remote), with low attack complexity and no privileges or user interaction needed. This means that any UE connecting to a malicious base station could be compromised to leak sensitive data. The flaw stems from weak encryption or improper cryptographic error handling in the modem’s communication protocols, which are critical for securing cellular network interactions. Although no known exploits are currently reported in the wild, the broad range of affected chipsets and the ease of exploitation make this a significant threat. The vendor has reserved the issue and assigned a patch ID (MOLY01513293), indicating that a fix is or will be available. This vulnerability highlights the risks inherent in cellular modem firmware, which is often less scrutinized than application-layer software but is a critical attack surface for mobile devices.
Potential Impact
For European organizations, the impact of CVE-2025-20667 can be substantial, especially for those relying on mobile communications for sensitive operations or using devices with MediaTek chipsets. The vulnerability enables attackers to remotely disclose sensitive information from devices connected to rogue base stations, which could include location data, subscriber identity, or other confidential information transmitted over the cellular network. This threatens the confidentiality of communications and could facilitate further targeted attacks, espionage, or data leakage. Enterprises with mobile workforces, IoT deployments, or critical infrastructure relying on cellular connectivity are at risk. The lack of required user interaction or privileges means that devices can be compromised silently, increasing the risk of undetected data breaches. Additionally, the vulnerability could undermine trust in mobile network security, impacting sectors such as finance, healthcare, and government services that depend on secure mobile communications. Given the widespread use of MediaTek chipsets in affordable smartphones popular in Europe, a large number of devices could be vulnerable, potentially affecting both corporate and consumer users. The threat also poses risks to mobile network operators and service providers who must guard against rogue base stations within their networks or geographic regions.
Mitigation Recommendations
To mitigate CVE-2025-20667, European organizations should take a multi-layered approach: 1) Ensure that all devices using affected MediaTek chipsets receive and apply firmware updates or patches from device manufacturers or carriers as soon as they become available. Coordination with vendors to confirm patch deployment is critical. 2) Mobile network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying advanced radio frequency monitoring tools and anomaly detection systems to identify unauthorized or suspicious base stations within their coverage areas. 3) Organizations should implement mobile device management (MDM) solutions that can enforce security policies, monitor device integrity, and restrict connections to untrusted networks. 4) For high-risk environments, consider using devices with modems from vendors with stronger security track records or additional hardware security features. 5) Educate users about the risks of connecting to unknown or untrusted cellular networks, although user interaction is not required for exploitation, awareness can help in some scenarios. 6) Network segmentation and encryption at higher communication layers (e.g., VPNs, application-layer encryption) can reduce the impact of any data leakage from the modem layer. 7) Collaborate with national cybersecurity agencies and telecom regulators to promote best practices and rapid incident response to rogue base station threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.368Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6ac3
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:32:31 AM
Last updated: 8/12/2025, 3:04:01 PM
Views: 16
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.