Skip to main content

CVE-2025-20670: CWE-295 Improper Certificate Validation in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798

Medium
VulnerabilityCVE-2025-20670cvecve-2025-20670cwe-295
Published: Mon May 05 2025 (05/05/2025, 02:49:16 UTC)
Source: CVE
Vendor/Project: MediaTek, Inc.
Product: MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798

Description

In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.

AI-Powered Analysis

AILast updated: 07/12/2025, 03:18:28 UTC

Technical Analysis

CVE-2025-20670 is a medium-severity vulnerability identified in various MediaTek modem chipsets, including models MT2737 through MT8798, affecting modem versions NR16, NR17, and NR17R. The root cause is improper certificate validation (CWE-295) within the modem firmware, which can lead to a permission bypass scenario. Specifically, if a user equipment (UE) device equipped with one of these affected MediaTek modems connects to a rogue base station controlled by an attacker, the improper validation of certificates allows the attacker to bypass normal permission checks. This can result in remote information disclosure. Exploitation requires user execution privileges and user interaction, meaning the victim must perform some action, such as connecting to a malicious network or accepting a connection, for the attack to succeed. The vulnerability does not impact confidentiality or integrity directly but affects availability, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H). The vulnerability is network exploitable with low attack complexity but requires privileges and user interaction. No known exploits are currently reported in the wild, and no patch links are provided in the data, although a patch ID (MOLY01334347) and issue ID (MSV-2772) are referenced. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices globally, including smartphones and IoT devices, making the potential attack surface large. Attackers controlling rogue base stations could exploit this flaw to disrupt service availability or cause denial of service conditions on affected devices.

Potential Impact

For European organizations, the impact of CVE-2025-20670 can be substantial, especially for enterprises relying on mobile communications and IoT devices powered by MediaTek chipsets. The vulnerability could be exploited in public or private cellular networks where attackers set up rogue base stations to intercept or disrupt communications. This could lead to denial of service conditions on critical mobile devices, affecting business continuity, especially for sectors dependent on mobile connectivity such as logistics, emergency services, and remote workforce operations. Although the vulnerability does not directly compromise data confidentiality or integrity, the availability impact could disrupt communications and operational processes. Additionally, the requirement for user interaction means social engineering or phishing tactics could be used to lure users into connecting to malicious networks. European organizations with employees traveling or operating in environments with less secure cellular infrastructure may be at higher risk. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the likelihood of exposure. Furthermore, disruption of mobile services could have cascading effects on critical infrastructure and services that rely on cellular connectivity.

Mitigation Recommendations

To mitigate CVE-2025-20670, European organizations should implement a multi-layered approach: 1) Ensure all devices using affected MediaTek modems are updated with the latest firmware patches from device manufacturers or MediaTek as soon as they become available, referencing patch ID MOLY01334347. 2) Educate users about the risks of connecting to unknown or untrusted cellular networks, emphasizing caution when prompted to connect to new base stations or networks, especially in public or unsecured environments. 3) Deploy network monitoring solutions capable of detecting rogue base stations or anomalous cellular network behavior within organizational premises and critical operational areas. 4) For critical mobile and IoT deployments, consider using devices with alternative chipsets or additional security controls that validate cellular network authenticity more robustly. 5) Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations in regions of operation. 6) Implement endpoint security solutions that can alert or block suspicious network connections initiated by the device. 7) For high-risk environments, restrict device connectivity to trusted networks using Mobile Device Management (MDM) policies or VPNs that can detect and prevent connections to unauthorized cellular networks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.370Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6a79

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/12/2025, 3:18:28 AM

Last updated: 8/17/2025, 10:59:23 AM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats