Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20703: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20703cvecve-2025-20703cwe-125
Published: Mon Sep 01 2025 (09/01/2025, 05:12:17 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01599794; Issue ID: MSV-3708.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:54:03 UTC

Technical Analysis

CVE-2025-20703 is a high-severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The flaw resides in the modem's firmware, specifically in the bounds checking logic. An incorrect bounds check allows an attacker controlling a rogue base station to induce an out-of-bounds read condition remotely. This vulnerability does not require any user interaction or prior authentication, making it remotely exploitable by simply having a User Equipment (UE) device connect to the malicious base station. The primary impact of this flaw is a denial of service (DoS) condition, which can disrupt the modem's normal operation, potentially causing the device to crash or reboot. The vulnerability affects modem firmware versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 7.5, indicating a high severity level, with an attack vector of network (remote), low attack complexity, no privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). There are no known exploits in the wild as of the publication date (September 1, 2025), and no patch links were provided, though MediaTek has assigned an internal patch ID (MOLY01599794) and issue ID (MSV-3708). The vulnerability affects a wide range of MediaTek modems commonly used in mobile devices, IoT gateways, and embedded communication modules, which are integral to cellular connectivity.

Potential Impact

For European organizations, the impact of CVE-2025-20703 can be significant, especially for those relying on devices with MediaTek modems for critical communications infrastructure, mobile workforce connectivity, or IoT deployments. The vulnerability enables attackers to cause denial of service remotely by setting up rogue base stations, which could disrupt cellular connectivity for affected devices. This disruption can lead to loss of communication, impacting business operations, emergency services, and critical infrastructure monitoring. Enterprises using mobile broadband for remote sites or mobile employees may experience outages, affecting productivity and operational continuity. Additionally, sectors such as transportation, healthcare, and utilities that increasingly depend on cellular IoT devices could face service interruptions. The lack of confidentiality or integrity impact reduces the risk of data breaches, but availability disruption alone can have cascading effects on dependent systems and services. Given the ease of exploitation and no user interaction requirement, the threat is particularly concerning in urban or high-density areas where rogue base stations can be deployed covertly.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Identify and inventory all devices using affected MediaTek modem chipsets and firmware versions NR15 through NR17R. 2) Engage with device manufacturers and vendors to obtain and apply firmware updates or patches as soon as they become available from MediaTek or OEMs. 3) Implement network-level detection and prevention mechanisms to identify and block rogue base stations, such as using cellular network anomaly detection tools and SIM-based security features. 4) Employ mobile device management (MDM) solutions to monitor device connectivity and enforce security policies that can detect unusual network behavior indicative of rogue base station attacks. 5) For critical deployments, consider fallback communication methods or redundant connectivity options to maintain availability during potential outages. 6) Educate security teams about the threat of rogue base stations and incorporate this vulnerability into incident response plans. 7) Collaborate with mobile network operators to report and mitigate rogue base station activity in their coverage areas. These steps go beyond generic patching advice by emphasizing proactive detection, inventory management, and operational resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc1e

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 9/8/2025, 6:54:03 AM

Last updated: 10/19/2025, 3:44:04 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats