CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
AI Analysis
Technical Summary
CVE-2025-20678 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT6739 through MT8893 and their variants, running modem firmware versions LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability arises from improper error handling in the IMS (IP Multimedia Subsystem) service, which leads to uncontrolled recursion. This flaw can cause the system to crash, resulting in a denial of service (DoS) condition. Exploitation is possible remotely without requiring any privileges or user interaction. An attacker controlling a rogue base station can trigger this vulnerability when a user equipment (UE) connects to it, causing the modem to crash and disrupt network connectivity. The vulnerability is classified under CWE-674 (Improper Control of a Resource Through a Logic Time Bomb or Uncontrolled Recursion), indicating that recursive calls are not properly bounded or terminated, leading to resource exhaustion or system instability. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits are reported in the wild yet, but the wide range of affected chipsets and the ease of exploitation make this a significant threat. No patch links were provided, but MediaTek has assigned Patch ID MOLY01394606 and Issue ID MSV-2739 to address this issue.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for enterprises and service providers relying on devices embedded with affected MediaTek chipsets. The vulnerability enables remote denial of service without user interaction or privileges, which can disrupt mobile communications, IoT devices, and other connected equipment using these modems. Critical infrastructure sectors such as telecommunications, emergency services, and industrial control systems that use LTE/5G modems with these chipsets could experience outages or degraded service. This could lead to operational disruptions, loss of productivity, and potential safety risks. Additionally, organizations deploying large fleets of mobile devices or IoT sensors in the field may face widespread device failures if rogue base stations are used by attackers to exploit this vulnerability. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions can still have severe business consequences. The threat is particularly relevant in environments where network security controls are limited and where devices frequently connect to untrusted or public cellular networks.
Mitigation Recommendations
1. Immediate deployment of firmware updates or patches from MediaTek or device manufacturers once available is critical to remediate the vulnerability. 2. Network operators and enterprises should implement detection and prevention mechanisms to identify and block rogue base stations, such as using IMSI catchers detection tools and anomaly-based network monitoring. 3. Employ network access control policies that restrict device connections to trusted base stations or use SIM-based authentication enhancements to prevent unauthorized network attachment. 4. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability until patches are applied. 5. Regularly audit and update device firmware to ensure all security patches are applied promptly. 6. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in high-risk environments. 7. Collaborate with mobile network operators to enhance base station authentication and integrity verification mechanisms to reduce the risk of rogue base station attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20678: CWE-674 Uncontrolled Recursion in MediaTek, Inc. MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
AI-Powered Analysis
Technical Analysis
CVE-2025-20678 is a high-severity vulnerability affecting a broad range of MediaTek modem chipsets, specifically models MT6739 through MT8893 and their variants, running modem firmware versions LR12A, LR13, NR15, NR16, NR17, and NR17R. The vulnerability arises from improper error handling in the IMS (IP Multimedia Subsystem) service, which leads to uncontrolled recursion. This flaw can cause the system to crash, resulting in a denial of service (DoS) condition. Exploitation is possible remotely without requiring any privileges or user interaction. An attacker controlling a rogue base station can trigger this vulnerability when a user equipment (UE) connects to it, causing the modem to crash and disrupt network connectivity. The vulnerability is classified under CWE-674 (Improper Control of a Resource Through a Logic Time Bomb or Uncontrolled Recursion), indicating that recursive calls are not properly bounded or terminated, leading to resource exhaustion or system instability. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits are reported in the wild yet, but the wide range of affected chipsets and the ease of exploitation make this a significant threat. No patch links were provided, but MediaTek has assigned Patch ID MOLY01394606 and Issue ID MSV-2739 to address this issue.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for enterprises and service providers relying on devices embedded with affected MediaTek chipsets. The vulnerability enables remote denial of service without user interaction or privileges, which can disrupt mobile communications, IoT devices, and other connected equipment using these modems. Critical infrastructure sectors such as telecommunications, emergency services, and industrial control systems that use LTE/5G modems with these chipsets could experience outages or degraded service. This could lead to operational disruptions, loss of productivity, and potential safety risks. Additionally, organizations deploying large fleets of mobile devices or IoT sensors in the field may face widespread device failures if rogue base stations are used by attackers to exploit this vulnerability. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruptions can still have severe business consequences. The threat is particularly relevant in environments where network security controls are limited and where devices frequently connect to untrusted or public cellular networks.
Mitigation Recommendations
1. Immediate deployment of firmware updates or patches from MediaTek or device manufacturers once available is critical to remediate the vulnerability. 2. Network operators and enterprises should implement detection and prevention mechanisms to identify and block rogue base stations, such as using IMSI catchers detection tools and anomaly-based network monitoring. 3. Employ network access control policies that restrict device connections to trusted base stations or use SIM-based authentication enhancements to prevent unauthorized network attachment. 4. For critical deployments, consider using devices with alternative chipsets not affected by this vulnerability until patches are applied. 5. Regularly audit and update device firmware to ensure all security patches are applied promptly. 6. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in high-risk environments. 7. Collaborate with mobile network operators to enhance base station authentication and integrity verification mechanisms to reduce the risk of rogue base station attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.371Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 683d16f6182aa0cae230af0c
Added to database: 6/2/2025, 3:13:58 AM
Last enriched: 7/9/2025, 12:27:52 PM
Last updated: 8/4/2025, 12:18:33 AM
Views: 87
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.