Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20704: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8792, MT8863, MT8873, MT8883

0
High
VulnerabilityCVE-2025-20704cvecve-2025-20704cwe-787
Published: Mon Sep 01 2025 (09/01/2025, 05:12:19 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8792, MT8863, MT8873, MT8883

Description

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01516959; Issue ID: MSV-3502.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:43:33 UTC

Technical Analysis

CVE-2025-20704 is a high-severity vulnerability identified in multiple MediaTek modem chipsets, including MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8792, MT8863, MT8873, and MT8883. The flaw is classified as a CWE-787 Out-of-bounds Write, which occurs due to a missing bounds check in the modem firmware (specifically versions Modem NR17 and NR17R). This vulnerability allows an attacker controlling a rogue base station to trigger an out-of-bounds write condition remotely when a user equipment (UE) connects to it. Exploitation does not require any additional execution privileges, but user interaction is necessary, meaning the victim device must connect to the malicious base station. The out-of-bounds write can lead to remote escalation of privilege, potentially compromising the confidentiality, integrity, and availability of the affected device. The CVSS v3.1 base score is 8.8, indicating a high severity level, with attack vector being network-based, low attack complexity, no privileges required, but user interaction needed. The vulnerability affects critical modem components that handle cellular communications, making it a significant threat to mobile devices using these MediaTek chipsets. No known exploits are currently reported in the wild, and a patch has been identified (MOLY01516959), though no direct patch links are provided. The vulnerability was reserved in November 2024 and published in September 2025.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those relying on mobile communications for critical operations, including enterprises with mobile workforce, IoT deployments, and telecom providers. Exploitation could allow attackers to escalate privileges on devices remotely by masquerading as rogue base stations, potentially leading to unauthorized access to sensitive data, interception or manipulation of communications, and disruption of services. This could impact confidentiality by exposing private communications, integrity by allowing data tampering, and availability by causing device instability or denial of service. Given the widespread use of MediaTek chipsets in smartphones and IoT devices, the attack surface is broad. The requirement for user interaction (connecting to a rogue base station) somewhat limits exploitation but does not eliminate risk, especially in public or untrusted environments. European organizations handling sensitive or regulated data (e.g., finance, healthcare, government) could face compliance and reputational damage if devices are compromised. Additionally, telecom operators could see network trust undermined if rogue base stations are used for large-scale attacks.

Mitigation Recommendations

Organizations should prioritize updating affected devices with the vendor-provided patches (MOLY01516959) as soon as they become available. Since the vulnerability resides in modem firmware, coordination with device manufacturers and mobile network operators is essential to ensure timely deployment. Network-level mitigations include monitoring for rogue base stations using radio frequency detection tools and anomaly detection systems to alert on suspicious cellular signals. Enterprises should educate users about the risks of connecting to unknown or untrusted cellular networks, especially in public or high-risk areas. Implementing mobile device management (MDM) solutions can help enforce security policies and facilitate patch management. For IoT deployments, network segmentation and strict access controls can limit the impact of compromised devices. Telecom providers should enhance base station authentication mechanisms and consider deploying detection systems for rogue base stations to protect subscribers. Finally, continuous monitoring and incident response plans should be updated to address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc21

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 9/8/2025, 6:43:33 AM

Last updated: 10/19/2025, 11:17:17 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats