Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2025-20703cvecve-2025-20703cwe-125
Published: Mon Sep 01 2025 (09/01/2025, 05:12:17 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:52:44 UTC

Technical Analysis

CVE-2025-20703 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6833, and many others up to MT8893. The root cause is an incorrect bounds check in the modem firmware that leads to reading memory outside the intended buffer boundaries. This flaw can be exploited remotely by an attacker who controls a rogue base station to which a user equipment (UE) connects. The attacker can trigger the vulnerability without any user interaction or elevated privileges, causing the modem to perform an out-of-bounds read that results in a denial of service (DoS) condition. The affected modem firmware versions include NR15, NR16, NR17, and NR17R. The vulnerability does not impact confidentiality or integrity but severely affects availability by potentially crashing or destabilizing the modem. The CVSS v3.1 base score is 6.5, reflecting the attack vector as adjacent network (the cellular network), low attack complexity, no privileges required, no user interaction, and impact limited to availability. No public exploits are known at this time, but the wide deployment of MediaTek chipsets in mobile devices globally increases the risk profile. The vendor has assigned Patch ID MOLY01599794 and Issue ID MSV-3708 for remediation. Given the nature of the flaw, mitigation requires firmware updates from device manufacturers or network operators. The vulnerability highlights the risks posed by rogue base stations and the importance of robust bounds checking in modem firmware to prevent memory safety issues.

Potential Impact

For European organizations, the primary impact of CVE-2025-20703 is the potential for remote denial of service attacks on mobile devices and IoT equipment using affected MediaTek modems. This can disrupt critical communications, especially for enterprises relying on cellular connectivity for remote operations, emergency services, or industrial control systems. Mobile network operators may face increased support costs and customer dissatisfaction due to service interruptions. The vulnerability could also be leveraged in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity to the target. While confidentiality and data integrity are not directly impacted, the loss of availability can have cascading effects on business continuity and operational resilience. European sectors such as telecommunications, finance, healthcare, and critical infrastructure that depend on cellular connectivity are particularly at risk. Additionally, the widespread use of MediaTek chipsets in consumer devices across Europe means that the general public could experience service degradation or outages. The threat underscores the need for coordinated patch management and network monitoring to detect and mitigate rogue base station activity.

Mitigation Recommendations

To mitigate CVE-2025-20703, European organizations should prioritize the following actions: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of firmware patches identified by Patch ID MOLY01599794. 2) Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring tools and anomaly detection systems. 3) Encourage users to update their devices promptly and educate them about the risks of connecting to untrusted cellular networks. 4) For enterprise deployments, consider multi-factor connectivity solutions that combine cellular with Wi-Fi or wired networks to maintain availability during cellular disruptions. 5) Collaborate with telecom regulators to enforce stricter controls and monitoring of base station equipment and spectrum usage. 6) Employ endpoint security solutions capable of detecting abnormal modem behavior indicative of exploitation attempts. 7) Conduct regular security assessments of IoT and mobile device fleets to identify vulnerable hardware and firmware versions. 8) Develop incident response plans that include scenarios involving cellular network denial of service to minimize operational impact. These measures go beyond generic advice by focusing on coordinated patching, network monitoring, user awareness, and regulatory cooperation tailored to the cellular modem threat landscape.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc1e

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 2/18/2026, 8:52:44 AM

Last updated: 3/25/2026, 7:37:41 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses