Skip to main content

CVE-2025-20673: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT7902, MT7921, MT7922, MT7925, MT7927

Medium
VulnerabilityCVE-2025-20673cvecve-2025-20673cwe-476
Published: Mon Jun 02 2025 (06/02/2025, 02:29:40 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT7902, MT7921, MT7922, MT7925, MT7927

Description

In wlan STA driver, there is a possible system crash due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00413200; Issue ID: MSV-3304.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:27:04 UTC

Technical Analysis

CVE-2025-20673 is a medium severity vulnerability identified in MediaTek's WLAN STA driver affecting several wireless chipset models including MT7902, MT7921, MT7922, MT7925, and MT7927. The root cause is a NULL pointer dereference (CWE-476) that leads to an uncaught exception within the driver code. This flaw can cause the affected system to crash, resulting in a local denial of service (DoS) condition. Exploitation requires user-level execution privileges but does not require user interaction, meaning an attacker with local access can trigger the crash without additional user actions. The vulnerability affects devices running NB SDK release 3.6 and earlier versions. The CVSS v3.1 base score is 5.5, reflecting medium severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No known exploits are currently reported in the wild, and no patch links are provided in the data, though a patch ID (WCNCR00413200) and issue ID (MSV-3304) are referenced. This vulnerability could be triggered by an attacker or malicious software running locally on affected devices, causing system instability or crashes, potentially disrupting wireless connectivity and dependent services.

Potential Impact

For European organizations, the impact of CVE-2025-20673 primarily manifests as a local denial of service on devices using the affected MediaTek wireless chipsets. This could disrupt wireless network connectivity, impacting business operations reliant on Wi-Fi communication, especially in environments with many IoT or embedded devices using these chipsets. Critical infrastructure or industrial control systems employing these wireless modules could experience operational interruptions. Although the vulnerability does not allow for data theft or code execution, the availability impact could degrade productivity and cause service outages. The requirement for local privileges limits remote exploitation, but insider threats or malware with local access could leverage this vulnerability. Organizations with large deployments of affected devices may face increased risk of network instability or downtime, which could have cascading effects on business continuity and security monitoring systems.

Mitigation Recommendations

To mitigate CVE-2025-20673, European organizations should prioritize updating affected devices to firmware or SDK versions beyond NB SDK release 3.6 where the vulnerability is patched. Since no direct patch links are provided, organizations should contact MediaTek or device vendors for the latest security updates referencing patch ID WCNCR00413200. Network administrators should implement strict access controls to limit local user privileges on devices with these chipsets, reducing the risk of local exploitation. Monitoring for unusual system crashes or wireless interface failures can help detect exploitation attempts. Employing endpoint protection solutions capable of detecting anomalous local activity and enforcing application whitelisting can further reduce risk. For critical environments, consider network segmentation to isolate vulnerable devices and reduce the impact of potential DoS conditions. Additionally, organizations should maintain an inventory of devices using these chipsets to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.371Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683d16f6182aa0cae230af02

Added to database: 6/2/2025, 3:13:58 AM

Last enriched: 7/9/2025, 12:27:04 PM

Last updated: 8/14/2025, 6:44:32 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats