Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20708cvecve-2025-20708cwe-787
Published: Mon Sep 01 2025 (09/01/2025, 05:12:16 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.

AI-Powered Analysis

AILast updated: 09/08/2025, 06:44:35 UTC

Technical Analysis

CVE-2025-20708 is a high-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The vulnerability arises from an incorrect bounds check in the modem firmware, which allows an attacker to perform an out-of-bounds write operation. This flaw can be exploited remotely without requiring any user interaction or prior authentication. Specifically, exploitation occurs when a user equipment (UE) device connects to a rogue base station controlled by an attacker. The attacker can leverage this to escalate privileges remotely on the modem, potentially gaining control over modem operations or executing arbitrary code. The vulnerability impacts modem versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 8.1, indicating a high severity level, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be launched remotely over the network, requires high attack complexity, no privileges or user interaction, and results in high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patch links are provided yet, though a patch ID (MOLY01123853) and issue ID (MSV-4131) are referenced by MediaTek. This vulnerability is critical for devices relying on affected MediaTek modems, as it undermines the trustworthiness of cellular communications and could lead to unauthorized access or disruption of mobile network services.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers relying on mobile communications infrastructure or IoT devices using MediaTek modems. Compromise of the modem firmware could lead to interception or manipulation of sensitive communications, unauthorized network access, or disruption of critical services. Industries such as telecommunications, finance, healthcare, and critical infrastructure that depend on secure mobile connectivity could face data breaches, service outages, or espionage. The fact that exploitation requires only connection to a rogue base station means attackers could deploy malicious base stations in public or targeted areas to compromise devices without physical access or user interaction. This elevates the threat in urban and industrial environments where mobile devices are ubiquitous. Additionally, the vulnerability could be leveraged in supply chain attacks or targeted espionage campaigns against high-value targets in Europe. The high confidentiality, integrity, and availability impacts underscore the potential for severe operational and reputational damage.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Prioritize obtaining and deploying firmware updates from device manufacturers and MediaTek as soon as patches become available, referencing the patch ID MOLY01123853. 2) Employ network-level protections to detect and block rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 3) Enforce strict device management policies to restrict use of vulnerable devices in sensitive environments until patched. 4) Collaborate with mobile network operators to enhance detection and mitigation of unauthorized base stations. 5) Conduct regular security assessments and penetration testing focusing on cellular connectivity components. 6) Educate users and administrators about the risks of connecting to untrusted networks and encourage use of VPNs or encrypted communication channels to reduce exposure. 7) For IoT deployments, consider network segmentation and device isolation to limit the impact of compromised modems. 8) Monitor threat intelligence feeds for emerging exploit reports related to this CVE to respond promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.383Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b52c73ad5a09ad00c8fc2d

Added to database: 9/1/2025, 5:17:39 AM

Last enriched: 9/8/2025, 6:44:35 AM

Last updated: 10/19/2025, 8:58:27 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats