CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.
AI Analysis
Technical Summary
CVE-2025-20703 is a high-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The flaw resides in the modem's firmware, specifically in the bounds checking logic. An incorrect bounds check allows an attacker controlling a rogue base station to induce an out-of-bounds read condition remotely. This vulnerability does not require any user interaction or prior authentication, making it remotely exploitable by simply having a User Equipment (UE) device connect to the malicious base station. The primary impact of this flaw is a denial of service (DoS) condition, which can disrupt the modem's normal operation, potentially causing the device to crash or reboot. The vulnerability affects modem firmware versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). There are no known exploits in the wild as of the publication date (September 1, 2025), and no patch links were provided, though MediaTek has assigned an internal patch ID (MOLY01599794) and issue ID (MSV-3708). The vulnerability affects a wide range of MediaTek modems commonly used in mobile devices, IoT gateways, and embedded communication modules, which are integral to cellular connectivity.
Potential Impact
For European organizations, the impact of CVE-2025-20703 can be significant, especially for those relying on devices with MediaTek modems for critical communications infrastructure, mobile workforce connectivity, or IoT deployments. The vulnerability enables attackers to cause denial of service remotely by setting up rogue base stations, which could disrupt cellular connectivity for affected devices. This disruption can lead to loss of communication, impacting business operations, emergency services, and critical infrastructure monitoring. Enterprises using mobile broadband for remote sites or mobile employees may experience outages, affecting productivity and operational continuity. Additionally, sectors such as transportation, healthcare, and utilities that increasingly depend on cellular IoT devices could face service interruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruption alone can have cascading effects on dependent systems and services. Given the ease of exploitation and no user interaction requirement, the threat is particularly concerning in urban or high-density areas where rogue base stations can be deployed covertly.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Identify and inventory all devices using affected MediaTek modem chipsets and firmware versions NR15 through NR17R. 2) Engage with device manufacturers and vendors to obtain and apply firmware updates or patches as soon as they become available from MediaTek or OEMs. 3) Implement network-level detection and prevention mechanisms to identify and block rogue base stations, such as using cellular network anomaly detection tools and SIM-based security features. 4) Employ mobile device management (MDM) solutions to monitor device connectivity and enforce security policies that can detect unusual network behavior indicative of rogue base station attacks. 5) For critical deployments, consider fallback communication methods or redundant connectivity options to maintain availability during potential outages. 6) Educate security teams about the threat of rogue base stations and incorporate this vulnerability into incident response plans. 7) Collaborate with mobile network operators to report and mitigate rogue base station activity in their coverage areas. These steps go beyond generic patching advice by emphasizing proactive detection, inventory management, and operational resilience.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.
AI-Powered Analysis
Technical Analysis
CVE-2025-20703 is a high-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The flaw resides in the modem's firmware, specifically in the bounds checking logic. An incorrect bounds check allows an attacker controlling a rogue base station to induce an out-of-bounds read condition remotely. This vulnerability does not require any user interaction or prior authentication, making it remotely exploitable by simply having a User Equipment (UE) device connect to the malicious base station. The primary impact of this flaw is a denial of service (DoS) condition, which can disrupt the modem's normal operation, potentially causing the device to crash or reboot. The vulnerability affects modem firmware versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). There are no known exploits in the wild as of the publication date (September 1, 2025), and no patch links were provided, though MediaTek has assigned an internal patch ID (MOLY01599794) and issue ID (MSV-3708). The vulnerability affects a wide range of MediaTek modems commonly used in mobile devices, IoT gateways, and embedded communication modules, which are integral to cellular connectivity.
Potential Impact
For European organizations, the impact of CVE-2025-20703 can be significant, especially for those relying on devices with MediaTek modems for critical communications infrastructure, mobile workforce connectivity, or IoT deployments. The vulnerability enables attackers to cause denial of service remotely by setting up rogue base stations, which could disrupt cellular connectivity for affected devices. This disruption can lead to loss of communication, impacting business operations, emergency services, and critical infrastructure monitoring. Enterprises using mobile broadband for remote sites or mobile employees may experience outages, affecting productivity and operational continuity. Additionally, sectors such as transportation, healthcare, and utilities that increasingly depend on cellular IoT devices could face service interruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruption alone can have cascading effects on dependent systems and services. Given the ease of exploitation and no user interaction requirement, the threat is particularly concerning in urban or high-density areas where rogue base stations can be deployed covertly.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Identify and inventory all devices using affected MediaTek modem chipsets and firmware versions NR15 through NR17R. 2) Engage with device manufacturers and vendors to obtain and apply firmware updates or patches as soon as they become available from MediaTek or OEMs. 3) Implement network-level detection and prevention mechanisms to identify and block rogue base stations, such as using cellular network anomaly detection tools and SIM-based security features. 4) Employ mobile device management (MDM) solutions to monitor device connectivity and enforce security policies that can detect unusual network behavior indicative of rogue base station attacks. 5) For critical deployments, consider fallback communication methods or redundant connectivity options to maintain availability during potential outages. 6) Educate security teams about the threat of rogue base stations and incorporate this vulnerability into incident response plans. 7) Collaborate with mobile network operators to report and mitigate rogue base station activity in their coverage areas. These steps go beyond generic patching advice by emphasizing proactive detection, inventory management, and operational resilience.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.383Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b52c73ad5a09ad00c8fc1e
Added to database: 9/1/2025, 5:17:39 AM
Last enriched: 9/8/2025, 6:54:03 AM
Last updated: 10/19/2025, 3:44:04 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62672: n/a
HighCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.