CVE-2025-20670: CWE-295 Improper Certificate Validation in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.
AI Analysis
Technical Summary
CVE-2025-20670 is a vulnerability identified in a wide range of MediaTek modem chipsets, including models MT2737, MT6813, MT6835 series, MT6878 series, MT6895 series, MT6980 series, MT6990 series, MT8666 series, MT8765 series, MT8788 series, and others. The root cause is improper certificate validation (CWE-295) within the modem firmware, which leads to a permission bypass scenario. Specifically, when a user equipment (UE) device connects to a rogue base station controlled by an attacker, the modem may fail to properly validate the base station's certificate, allowing the attacker to bypass security checks. This can result in remote information disclosure, though the CVSS vector indicates no direct confidentiality or integrity impact, but a high impact on availability. Exploitation requires user interaction, meaning the user must connect to the malicious base station, which could be facilitated by social engineering or environmental factors. The affected firmware versions are Modem NR16, NR17, and NR17R. The vulnerability was published on May 5, 2025, with a CVSS 3.1 score of 5.7 (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), indicating an attack vector requiring adjacent network access, low attack complexity, no privileges required, and user interaction. Although no known exploits are currently in the wild, the vulnerability poses a risk to devices using these chipsets, which are common in many mobile phones and IoT devices. The issue ID is MSV-2772, and a patch (MOLY01334347) has been identified by MediaTek but is not linked in the provided data. This vulnerability could be leveraged by attackers to disrupt device availability or cause denial of service by exploiting the permission bypass in the modem's certificate validation process.
Potential Impact
For European organizations, the primary impact of CVE-2025-20670 lies in potential service disruption and information disclosure risks when devices connect to rogue cellular base stations. Telecommunications providers, enterprises relying on mobile connectivity, and IoT deployments using affected MediaTek chipsets could experience degraded service availability or unauthorized data exposure. The vulnerability could be exploited in targeted attacks against high-value individuals or critical infrastructure by setting up malicious base stations to intercept or disrupt communications. Although confidentiality and integrity impacts are rated low, availability impacts could affect operational continuity, especially in sectors relying on mobile networks for critical communications such as emergency services, transportation, and finance. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk from social engineering or inadvertent user behavior. Given the widespread use of MediaTek chipsets in consumer and industrial devices across Europe, the threat could affect a broad range of endpoints, increasing the attack surface for adversaries. Organizations with mobile device management (MDM) policies and network access controls may mitigate some risk, but those with unmanaged devices are more vulnerable.
Mitigation Recommendations
1. Apply the official MediaTek patch MOLY01334347 as soon as it becomes available for affected devices and firmware versions (NR16, NR17, NR17R). 2. Implement network access controls to restrict UE connections to trusted and verified cellular base stations, using SIM-based or network-level authentication mechanisms where possible. 3. Educate users about the risks of connecting to unknown or suspicious cellular networks, emphasizing caution in environments where rogue base stations could be present. 4. Employ mobile device management (MDM) solutions to monitor and restrict device network connections and enforce security policies. 5. Use anomaly detection systems to identify unusual cellular network behavior or unexpected base station connections indicative of rogue infrastructure. 6. Collaborate with telecom providers to enhance detection and mitigation of rogue base stations within their networks. 7. For critical infrastructure, consider deploying multi-factor authentication and end-to-end encryption at higher layers to reduce reliance on modem-level security. 8. Regularly audit and update device firmware to ensure all security patches are applied promptly. 9. Monitor threat intelligence feeds for any emerging exploits or attack campaigns leveraging this vulnerability.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Poland, Netherlands, Sweden, Belgium, Czech Republic
CVE-2025-20670: CWE-295 Improper Certificate Validation in MediaTek, Inc. MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798
Description
In Modem, there is a possible permission bypass due to improper certificate validation. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with User execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01334347; Issue ID: MSV-2772.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20670 is a vulnerability identified in a wide range of MediaTek modem chipsets, including models MT2737, MT6813, MT6835 series, MT6878 series, MT6895 series, MT6980 series, MT6990 series, MT8666 series, MT8765 series, MT8788 series, and others. The root cause is improper certificate validation (CWE-295) within the modem firmware, which leads to a permission bypass scenario. Specifically, when a user equipment (UE) device connects to a rogue base station controlled by an attacker, the modem may fail to properly validate the base station's certificate, allowing the attacker to bypass security checks. This can result in remote information disclosure, though the CVSS vector indicates no direct confidentiality or integrity impact, but a high impact on availability. Exploitation requires user interaction, meaning the user must connect to the malicious base station, which could be facilitated by social engineering or environmental factors. The affected firmware versions are Modem NR16, NR17, and NR17R. The vulnerability was published on May 5, 2025, with a CVSS 3.1 score of 5.7 (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H), indicating an attack vector requiring adjacent network access, low attack complexity, no privileges required, and user interaction. Although no known exploits are currently in the wild, the vulnerability poses a risk to devices using these chipsets, which are common in many mobile phones and IoT devices. The issue ID is MSV-2772, and a patch (MOLY01334347) has been identified by MediaTek but is not linked in the provided data. This vulnerability could be leveraged by attackers to disrupt device availability or cause denial of service by exploiting the permission bypass in the modem's certificate validation process.
Potential Impact
For European organizations, the primary impact of CVE-2025-20670 lies in potential service disruption and information disclosure risks when devices connect to rogue cellular base stations. Telecommunications providers, enterprises relying on mobile connectivity, and IoT deployments using affected MediaTek chipsets could experience degraded service availability or unauthorized data exposure. The vulnerability could be exploited in targeted attacks against high-value individuals or critical infrastructure by setting up malicious base stations to intercept or disrupt communications. Although confidentiality and integrity impacts are rated low, availability impacts could affect operational continuity, especially in sectors relying on mobile networks for critical communications such as emergency services, transportation, and finance. The requirement for user interaction reduces the likelihood of widespread automated exploitation but does not eliminate risk from social engineering or inadvertent user behavior. Given the widespread use of MediaTek chipsets in consumer and industrial devices across Europe, the threat could affect a broad range of endpoints, increasing the attack surface for adversaries. Organizations with mobile device management (MDM) policies and network access controls may mitigate some risk, but those with unmanaged devices are more vulnerable.
Mitigation Recommendations
1. Apply the official MediaTek patch MOLY01334347 as soon as it becomes available for affected devices and firmware versions (NR16, NR17, NR17R). 2. Implement network access controls to restrict UE connections to trusted and verified cellular base stations, using SIM-based or network-level authentication mechanisms where possible. 3. Educate users about the risks of connecting to unknown or suspicious cellular networks, emphasizing caution in environments where rogue base stations could be present. 4. Employ mobile device management (MDM) solutions to monitor and restrict device network connections and enforce security policies. 5. Use anomaly detection systems to identify unusual cellular network behavior or unexpected base station connections indicative of rogue infrastructure. 6. Collaborate with telecom providers to enhance detection and mitigation of rogue base stations within their networks. 7. For critical infrastructure, consider deploying multi-factor authentication and end-to-end encryption at higher layers to reduce reliance on modem-level security. 8. Regularly audit and update device firmware to ensure all security patches are applied promptly. 9. Monitor threat intelligence feeds for any emerging exploits or attack campaigns leveraging this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.370Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6a79
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 2/18/2026, 8:51:18 AM
Last updated: 3/24/2026, 11:59:41 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.