CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
AI Analysis
Technical Summary
CVE-2025-20678 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) found in the IMS service of multiple MediaTek modem chipsets, including but not limited to MT6739, MT6761, MT6762 series, MT6769 series, and many others. The flaw arises due to improper error handling within the IMS service, which leads to uncontrolled recursion and ultimately causes a system crash. This crash results in a denial of service condition on the affected device. The vulnerability can be triggered remotely without any user interaction or elevated privileges, provided the device connects to a rogue base station controlled by an attacker. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of remote exploitation (attack vector: adjacent network), no required privileges or user interaction, and impact limited to availability (no confidentiality or integrity impact). The vulnerability is significant because it targets the IMS service, a critical component for voice and multimedia services over LTE and 5G networks. Disruption of IMS can degrade or halt telephony and data services on affected devices. Although no known exploits are currently reported in the wild, the broad range of affected chipsets and firmware versions indicates a large attack surface. MediaTek has assigned patch ID MOLY01394606 to address this issue, emphasizing the need for timely firmware updates.
Potential Impact
For European organizations, the primary impact of CVE-2025-20678 is the potential for remote denial of service on devices using affected MediaTek chipsets. This can disrupt mobile communications, including voice, SMS, and data services reliant on IMS, impacting both consumer and enterprise users. Telecommunications providers, emergency services, and critical infrastructure operators using devices with these chipsets could experience service outages or degraded network reliability. The vulnerability could be exploited by attackers deploying rogue base stations, which may be feasible in urban or high-value target areas. Disruption of mobile services can affect business continuity, emergency response, and operational communications. Additionally, enterprises with BYOD policies or mobile workforce relying on vulnerable devices may face increased risk of communication downtime. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the threat level in environments where rogue base stations can be deployed or encountered. However, the impact is limited to availability, with no direct compromise of data confidentiality or integrity.
Mitigation Recommendations
1. Immediate deployment of the official patch MOLY01394606 from MediaTek or device manufacturers incorporating this fix is critical. 2. Network operators should monitor for and mitigate rogue base stations using IMSI catchers or similar detection technologies to reduce exposure to attack vectors. 3. Enterprises should inventory devices to identify those with affected MediaTek chipsets and firmware versions and prioritize updates or device replacements. 4. Implement network-level anomaly detection to identify unusual IMS service disruptions or signaling patterns indicative of exploitation attempts. 5. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in sensitive or high-risk locations. 6. Collaborate with mobile network providers to ensure rapid dissemination of patches and security advisories. 7. For critical infrastructure, consider deploying multi-factor communication channels to maintain operational continuity if mobile services are disrupted. 8. Regularly update device firmware and baseband software as part of a comprehensive mobile device management strategy.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20678 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) found in the IMS service of multiple MediaTek modem chipsets, including but not limited to MT6739, MT6761, MT6762 series, MT6769 series, and many others. The flaw arises due to improper error handling within the IMS service, which leads to uncontrolled recursion and ultimately causes a system crash. This crash results in a denial of service condition on the affected device. The vulnerability can be triggered remotely without any user interaction or elevated privileges, provided the device connects to a rogue base station controlled by an attacker. The affected modem firmware versions include LR12A, LR13, NR15, NR16, NR17, and NR17R. The CVSS v3.1 score is 6.5 (medium severity), reflecting the ease of remote exploitation (attack vector: adjacent network), no required privileges or user interaction, and impact limited to availability (no confidentiality or integrity impact). The vulnerability is significant because it targets the IMS service, a critical component for voice and multimedia services over LTE and 5G networks. Disruption of IMS can degrade or halt telephony and data services on affected devices. Although no known exploits are currently reported in the wild, the broad range of affected chipsets and firmware versions indicates a large attack surface. MediaTek has assigned patch ID MOLY01394606 to address this issue, emphasizing the need for timely firmware updates.
Potential Impact
For European organizations, the primary impact of CVE-2025-20678 is the potential for remote denial of service on devices using affected MediaTek chipsets. This can disrupt mobile communications, including voice, SMS, and data services reliant on IMS, impacting both consumer and enterprise users. Telecommunications providers, emergency services, and critical infrastructure operators using devices with these chipsets could experience service outages or degraded network reliability. The vulnerability could be exploited by attackers deploying rogue base stations, which may be feasible in urban or high-value target areas. Disruption of mobile services can affect business continuity, emergency response, and operational communications. Additionally, enterprises with BYOD policies or mobile workforce relying on vulnerable devices may face increased risk of communication downtime. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the threat level in environments where rogue base stations can be deployed or encountered. However, the impact is limited to availability, with no direct compromise of data confidentiality or integrity.
Mitigation Recommendations
1. Immediate deployment of the official patch MOLY01394606 from MediaTek or device manufacturers incorporating this fix is critical. 2. Network operators should monitor for and mitigate rogue base stations using IMSI catchers or similar detection technologies to reduce exposure to attack vectors. 3. Enterprises should inventory devices to identify those with affected MediaTek chipsets and firmware versions and prioritize updates or device replacements. 4. Implement network-level anomaly detection to identify unusual IMS service disruptions or signaling patterns indicative of exploitation attempts. 5. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in sensitive or high-risk locations. 6. Collaborate with mobile network providers to ensure rapid dissemination of patches and security advisories. 7. For critical infrastructure, consider deploying multi-factor communication channels to maintain operational continuity if mobile services are disrupted. 8. Regularly update device firmware and baseband software as part of a comprehensive mobile device management strategy.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.371Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 683d16f6182aa0cae230af0c
Added to database: 6/2/2025, 3:13:58 AM
Last enriched: 2/18/2026, 8:51:32 AM
Last updated: 3/25/2026, 4:15:15 AM
Views: 125
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.