Skip to main content

CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

High
VulnerabilityCVE-2025-20678cvecve-2025-20678cwe-674
Published: Mon Jun 02 2025 (06/02/2025, 02:29:47 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:27:52 UTC

Technical Analysis

CVE-2025-20678 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT6739 through MT8893 and their variants, running modem firmware versions LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability arises from improper error handling in the IMS (IP Multimedia Subsystem) service, which leads to uncontrolled recursion. This flaw can cause the system to crash, resulting in a denial of service (DoS) condition. Exploitation is possible remotely without requiring any privileges or user interaction. An attacker controlling a rogue base station can trigger this vulnerability when a user equipment (UE) connects to it, causing the modem to crash and disrupt network connectivity. The vulnerability is classified under CWE-674 (Improper Control of a Resource Through a Logic Time Bomb or Uncontrolled Recursion), indicating that recursive calls are not properly bounded or terminated, leading to resource exhaustion or system instability. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits are reported in the wild yet, but the wide range of affected chipsets and the ease of exploitation make this a significant threat. No patch links were provided, but MediaTek has assigned Patch ID MOLY01394606 and Issue ID MSV-2739 to address this issue.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for enterprises and service providers relying on devices embedded with affected MediaTek chipsets. The vulnerability enables remote denial of service without user interaction or privileges, which can disrupt mobile communications, IoT devices, and other connected equipment using these modems. Critical infrastructure sectors such as telecommunications, emergency services, and industrial control systems that use LTE/5G modems with these chipsets could experience outages or degraded service. This could lead to operational disruptions, loss of productivity, and potential safety risks. Additionally, organizations deploying large fleets of mobile devices or IoT sensors in the field may face widespread device failures if rogue base stations are used by attackers to exploit this vulnerability. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions can still have severe business consequences. The threat is particularly relevant in environments where network security controls are limited and where devices frequently connect to untrusted or public cellular networks.

Mitigation Recommendations

1. Immediate deployment of firmware updates or patches from MediaTek or device manufacturers once available is critical to remediate the vulnerability. 2. Network operators and enterprises should implement detection and prevention mechanisms to identify and block rogue base stations, such as using IMSI catchers detection tools and anomaly-based network monitoring. 3. Employ network access control policies that restrict device connections to trusted base stations or use SIM-based authentication enhancements to prevent unauthorized network attachment. 4. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability until patches are applied. 5. Regularly audit and update device firmware to ensure all security patches are applied promptly. 6. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in high-risk environments. 7. Collaborate with mobile network operators to enhance base station authentication and integrity verification mechanisms to reduce the risk of rogue base station attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.371Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683d16f6182aa0cae230af0c

Added to database: 6/2/2025, 3:13:58 AM

Last enriched: 7/9/2025, 12:27:52 PM

Last updated: 8/4/2025, 12:18:33 AM

Views: 87

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats