CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.
AI Analysis
Technical Summary
CVE-2025-20703 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6833, and many others up to MT8893. The root cause is an incorrect bounds check in the modem firmware that leads to reading memory outside the intended buffer boundaries. This flaw can be exploited remotely by an attacker who controls a rogue base station to which a user equipment (UE) connects. The attacker can trigger the vulnerability without any user interaction or elevated privileges, causing the modem to perform an out-of-bounds read that results in a denial of service (DoS) condition. The affected modem firmware versions include NR15, NR16, NR17, and NR17R. The vulnerability does not impact confidentiality or integrity but severely affects availability by potentially crashing or destabilizing the modem. The CVSS v3.1 base score is 6.5, reflecting the attack vector as adjacent network (the cellular network), low attack complexity, no privileges required, no user interaction, and impact limited to availability. No public exploits are known at this time, but the wide deployment of MediaTek chipsets in mobile devices globally increases the risk profile. The vendor has assigned Patch ID MOLY01599794 and Issue ID MSV-3708 for remediation. Given the nature of the flaw, mitigation requires firmware updates from device manufacturers or network operators. The vulnerability highlights the risks posed by rogue base stations and the importance of robust bounds checking in modem firmware to prevent memory safety issues.
Potential Impact
For European organizations, the primary impact of CVE-2025-20703 is the potential for remote denial of service attacks on mobile devices and IoT equipment using affected MediaTek modems. This can disrupt critical communications, especially for enterprises relying on cellular connectivity for remote operations, emergency services, or industrial control systems. Mobile network operators may face increased support costs and customer dissatisfaction due to service interruptions. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity to the target. While confidentiality and data integrity are not directly impacted, the loss of availability can have cascading effects on business continuity and operational resilience. European sectors such as telecommunications, finance, healthcare, and critical infrastructure that depend on cellular connectivity are particularly at risk. Additionally, the widespread use of MediaTek chipsets in consumer devices across Europe means that the general public could experience service degradation or outages. The threat underscores the need for coordinated patch management and network monitoring to detect and mitigate rogue base station activity.
Mitigation Recommendations
To mitigate CVE-2025-20703, European organizations should prioritize the following actions: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of firmware patches identified by Patch ID MOLY01599794. 2) Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring tools and anomaly detection systems. 3) Encourage users to update their devices promptly and educate them about the risks of connecting to untrusted cellular networks. 4) For enterprise deployments, consider multi-factor connectivity solutions that combine cellular with Wi-Fi or wired networks to maintain availability during cellular disruptions. 5) Collaborate with telecom regulators to enforce stricter controls and monitoring of base station equipment and spectrum usage. 6) Employ endpoint security solutions capable of detecting abnormal modem behavior indicative of exploitation attempts. 7) Conduct regular security assessments of IoT and mobile device fleets to identify vulnerable hardware and firmware versions. 8) Develop incident response plans that include scenarios involving cellular network denial of service to minimize operational impact. These measures go beyond generic advice by focusing on coordinated patching, network monitoring, user awareness, and regulatory cooperation tailored to the cellular modem threat landscape.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20703 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6833, and many others up to MT8893. The root cause is an incorrect bounds check in the modem firmware that leads to reading memory outside the intended buffer boundaries. This flaw can be exploited remotely by an attacker who controls a rogue base station to which a user equipment (UE) connects. The attacker can trigger the vulnerability without any user interaction or elevated privileges, causing the modem to perform an out-of-bounds read that results in a denial of service (DoS) condition. The affected modem firmware versions include NR15, NR16, NR17, and NR17R. The vulnerability does not impact confidentiality or integrity but severely affects availability by potentially crashing or destabilizing the modem. The CVSS v3.1 base score is 6.5, reflecting the attack vector as adjacent network (the cellular network), low attack complexity, no privileges required, no user interaction, and impact limited to availability. No public exploits are known at this time, but the wide deployment of MediaTek chipsets in mobile devices globally increases the risk profile. The vendor has assigned Patch ID MOLY01599794 and Issue ID MSV-3708 for remediation. Given the nature of the flaw, mitigation requires firmware updates from device manufacturers or network operators. The vulnerability highlights the risks posed by rogue base stations and the importance of robust bounds checking in modem firmware to prevent memory safety issues.
Potential Impact
For European organizations, the primary impact of CVE-2025-20703 is the potential for remote denial of service attacks on mobile devices and IoT equipment using affected MediaTek modems. This can disrupt critical communications, especially for enterprises relying on cellular connectivity for remote operations, emergency services, or industrial control systems. Mobile network operators may face increased support costs and customer dissatisfaction due to service interruptions. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity to the target. While confidentiality and data integrity are not directly impacted, the loss of availability can have cascading effects on business continuity and operational resilience. European sectors such as telecommunications, finance, healthcare, and critical infrastructure that depend on cellular connectivity are particularly at risk. Additionally, the widespread use of MediaTek chipsets in consumer devices across Europe means that the general public could experience service degradation or outages. The threat underscores the need for coordinated patch management and network monitoring to detect and mitigate rogue base station activity.
Mitigation Recommendations
To mitigate CVE-2025-20703, European organizations should prioritize the following actions: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of firmware patches identified by Patch ID MOLY01599794. 2) Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring tools and anomaly detection systems. 3) Encourage users to update their devices promptly and educate them about the risks of connecting to untrusted cellular networks. 4) For enterprise deployments, consider multi-factor connectivity solutions that combine cellular with Wi-Fi or wired networks to maintain availability during cellular disruptions. 5) Collaborate with telecom regulators to enforce stricter controls and monitoring of base station equipment and spectrum usage. 6) Employ endpoint security solutions capable of detecting abnormal modem behavior indicative of exploitation attempts. 7) Conduct regular security assessments of IoT and mobile device fleets to identify vulnerable hardware and firmware versions. 8) Develop incident response plans that include scenarios involving cellular network denial of service to minimize operational impact. These measures go beyond generic advice by focusing on coordinated patching, network monitoring, user awareness, and regulatory cooperation tailored to the cellular modem threat landscape.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.383Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b52c73ad5a09ad00c8fc1e
Added to database: 9/1/2025, 5:17:39 AM
Last enriched: 2/18/2026, 8:52:44 AM
Last updated: 3/25/2026, 7:37:41 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.