CVE-2025-20670: CWE-295 Improper Certificate Validation in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.
AI Analysis
Technical Summary
CVE-2025-20670 is a medium-severity vulnerability identified in various MediaTek modem chipsets, including models MT2737 through MT8798, affecting modem versions NR16, NR17, and NR17R. The root cause is improper certificate validation (CWE-295) within the modem firmware, which can lead to a permission bypass scenario. Specifically, if a user equipment (UE) device equipped with one of these affected MediaTek modems connects to a rogue base station controlled by an attacker, the improper validation of certificates allows the attacker to bypass normal permission checks. This can result in remote information disclosure. Exploitation requires user execution privileges and user interaction, meaning the victim must perform some action, such as connecting to a malicious network or accepting a connection, for the attack to succeed. The vulnerability does not impact confidentiality or integrity directly but affects availability, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H). The vulnerability is network exploitable with low attack complexity but requires privileges and user interaction. No known exploits are currently reported in the wild, and no patch links are provided in the data, although a patch ID (MOLY01334347) and issue ID (MSV-2772) are referenced. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices globally, including smartphones and IoT devices, making the potential attack surface large. Attackers controlling rogue base stations could exploit this flaw to disrupt service availability or cause denial of service conditions on affected devices.
Potential Impact
For European organizations, the impact of CVE-2025-20670 can be substantial, especially for enterprises relying on mobile communications and IoT devices powered by MediaTek chipsets. The vulnerability could be exploited in public or private cellular networks where attackers set up rogue base stations to intercept or disrupt communications. This could lead to denial of service conditions on critical mobile devices, affecting business continuity, especially for sectors dependent on mobile connectivity such as logistics, emergency services, and remote workforce operations. Although the vulnerability does not directly compromise data confidentiality or integrity, the availability impact could disrupt communications and operational processes. Additionally, the requirement for user interaction means social engineering or phishing tactics could be used to lure users into connecting to malicious networks. European organizations with employees traveling or operating in environments with less secure cellular infrastructure may be at higher risk. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the likelihood of exposure. Furthermore, disruption of mobile services could have cascading effects on critical infrastructure and services that rely on cellular connectivity.
Mitigation Recommendations
To mitigate CVE-2025-20670, European organizations should implement a multi-layered approach: 1) Ensure all devices using affected MediaTek modems are updated with the latest firmware patches from device manufacturers or MediaTek as soon as they become available, referencing patch ID MOLY01334347. 2) Educate users about the risks of connecting to unknown or untrusted cellular networks, emphasizing caution when prompted to connect to new base stations or networks, especially in public or unsecured environments. 3) Deploy network monitoring solutions capable of detecting rogue base stations or anomalous cellular network behavior within organizational premises and critical operational areas. 4) For critical mobile and IoT deployments, consider using devices with alternative chipsets or additional security controls that validate cellular network authenticity more robustly. 5) Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations in regions of operation. 6) Implement endpoint security solutions that can alert or block suspicious network connections initiated by the device. 7) For high-risk environments, restrict device connectivity to trusted networks using Mobile Device Management (MDM) policies or VPNs that can detect and prevent connections to unauthorized cellular networks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-20670: CWE-295 Improper Certificate Validation in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
Description
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.
AI-Powered Analysis
Technical Analysis
CVE-2025-20670 is a medium-severity vulnerability identified in various MediaTek modem chipsets, including models MT2737 through MT8798, affecting modem versions NR16, NR17, and NR17R. The root cause is improper certificate validation (CWE-295) within the modem firmware, which can lead to a permission bypass scenario. Specifically, if a user equipment (UE) device equipped with one of these affected MediaTek modems connects to a rogue base station controlled by an attacker, the improper validation of certificates allows the attacker to bypass normal permission checks. This can result in remote information disclosure. Exploitation requires user execution privileges and user interaction, meaning the victim must perform some action, such as connecting to a malicious network or accepting a connection, for the attack to succeed. The vulnerability does not impact confidentiality or integrity directly but affects availability, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H). The vulnerability is network exploitable with low attack complexity but requires privileges and user interaction. No known exploits are currently reported in the wild, and no patch links are provided in the data, although a patch ID (MOLY01334347) and issue ID (MSV-2772) are referenced. This vulnerability is significant because MediaTek chipsets are widely used in mobile devices globally, including smartphones and IoT devices, making the potential attack surface large. Attackers controlling rogue base stations could exploit this flaw to disrupt service availability or cause denial of service conditions on affected devices.
Potential Impact
For European organizations, the impact of CVE-2025-20670 can be substantial, especially for enterprises relying on mobile communications and IoT devices powered by MediaTek chipsets. The vulnerability could be exploited in public or private cellular networks where attackers set up rogue base stations to intercept or disrupt communications. This could lead to denial of service conditions on critical mobile devices, affecting business continuity, especially for sectors dependent on mobile connectivity such as logistics, emergency services, and remote workforce operations. Although the vulnerability does not directly compromise data confidentiality or integrity, the availability impact could disrupt communications and operational processes. Additionally, the requirement for user interaction means social engineering or phishing tactics could be used to lure users into connecting to malicious networks. European organizations with employees traveling or operating in environments with less secure cellular infrastructure may be at higher risk. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the likelihood of exposure. Furthermore, disruption of mobile services could have cascading effects on critical infrastructure and services that rely on cellular connectivity.
Mitigation Recommendations
To mitigate CVE-2025-20670, European organizations should implement a multi-layered approach: 1) Ensure all devices using affected MediaTek modems are updated with the latest firmware patches from device manufacturers or MediaTek as soon as they become available, referencing patch ID MOLY01334347. 2) Educate users about the risks of connecting to unknown or untrusted cellular networks, emphasizing caution when prompted to connect to new base stations or networks, especially in public or unsecured environments. 3) Deploy network monitoring solutions capable of detecting rogue base stations or anomalous cellular network behavior within organizational premises and critical operational areas. 4) For critical mobile and IoT deployments, consider using devices with alternative chipsets or additional security controls that validate cellular network authenticity more robustly. 5) Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations in regions of operation. 6) Implement endpoint security solutions that can alert or block suspicious network connections initiated by the device. 7) For high-risk environments, restrict device connectivity to trusted networks using Mobile Device Management (MDM) policies or VPNs that can detect and prevent connections to unauthorized cellular networks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.370Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6a79
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/12/2025, 3:18:28 AM
Last updated: 8/17/2025, 10:59:23 AM
Views: 25
Related Threats
CVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-8098: CWE-276: Incorrect Default Permissions in Lenovo PC Manager
HighCVE-2025-53192: CWE-146 Improper Neutralization of Expression/Command Delimiters in Apache Software Foundation Apache Commons OGNL
HighCVE-2025-4371: CWE-347: Improper Verification of Cryptographic Signature in Lenovo 510 FHD Webcam
HighCVE-2025-32992: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.