CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.
AI Analysis
Technical Summary
CVE-2025-20708 is a critical security vulnerability classified under CWE-787 (Out-of-bounds Write) found in the modem firmware of numerous MediaTek chipsets, including MT2735 through MT8893 series. The root cause is an improper bounds check in the modem's code, which leads to writing data outside the intended memory buffer. This memory corruption can be remotely triggered when a user equipment (UE) connects to a maliciously controlled rogue base station. The attacker does not require any prior authentication or user interaction to exploit this flaw, making it particularly dangerous. Exploitation can result in remote escalation of privilege, potentially allowing the attacker to execute arbitrary code or disrupt modem operations, affecting confidentiality, integrity, and availability of the device. The vulnerability affects modem versions NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices globally. Despite no current public exploits, the vulnerability's nature and broad impact necessitate urgent attention. MediaTek has assigned Patch ID MOLY01123853 and Issue ID MSV-4131 to address this issue, though patch availability and deployment timelines are not specified. The CVSS v3.1 score of 8.8 reflects high severity, with attack vector being adjacent network (the cellular network), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. This vulnerability underscores the risks posed by rogue base stations and the critical need for secure modem firmware in mobile communications.
Potential Impact
The impact of CVE-2025-20708 is substantial for organizations and individuals relying on mobile devices with affected MediaTek modems. Successful exploitation can lead to full compromise of the modem's firmware, enabling attackers to escalate privileges remotely without user interaction. This can result in interception or manipulation of sensitive communications, disruption of cellular connectivity, and potential pivoting into other device components or networks. For enterprises, this could mean exposure of confidential corporate communications, disruption of mobile workforce connectivity, and increased risk of espionage or sabotage. For telecom operators, rogue base stations exploiting this vulnerability could undermine network integrity and customer trust. The broad range of affected chipsets, embedded in many smartphones, IoT devices, and other cellular-enabled hardware, amplifies the potential scale of impact globally. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and high severity score indicate that attackers could develop exploits rapidly once details become widespread.
Mitigation Recommendations
1. Apply official patches from MediaTek as soon as they become available, specifically addressing Patch ID MOLY01123853. 2. Coordinate with device manufacturers and mobile network operators to expedite firmware updates on affected devices. 3. Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 4. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in high-risk environments. 5. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device security posture. 6. For critical infrastructure relying on cellular connectivity, consider deploying multi-factor authentication and encryption at higher protocol layers to mitigate potential data interception. 7. Monitor security advisories from MediaTek and related vendors for updates and additional mitigation guidance. 8. Conduct penetration testing and security assessments focusing on cellular network interfaces to identify potential exploitation attempts.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Italy, Canada, Australia, Mexico, Indonesia
CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20708 is a critical security vulnerability classified under CWE-787 (Out-of-bounds Write) found in the modem firmware of numerous MediaTek chipsets, including MT2735 through MT8893 series. The root cause is an improper bounds check in the modem's code, which leads to writing data outside the intended memory buffer. This memory corruption can be remotely triggered when a user equipment (UE) connects to a maliciously controlled rogue base station. The attacker does not require any prior authentication or user interaction to exploit this flaw, making it particularly dangerous. Exploitation can result in remote escalation of privilege, potentially allowing the attacker to execute arbitrary code or disrupt modem operations, affecting confidentiality, integrity, and availability of the device. The vulnerability affects modem versions NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices globally. Despite no current public exploits, the vulnerability's nature and broad impact necessitate urgent attention. MediaTek has assigned Patch ID MOLY01123853 and Issue ID MSV-4131 to address this issue, though patch availability and deployment timelines are not specified. The CVSS v3.1 score of 8.8 reflects high severity, with attack vector being adjacent network (the cellular network), low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. This vulnerability underscores the risks posed by rogue base stations and the critical need for secure modem firmware in mobile communications.
Potential Impact
The impact of CVE-2025-20708 is substantial for organizations and individuals relying on mobile devices with affected MediaTek modems. Successful exploitation can lead to full compromise of the modem's firmware, enabling attackers to escalate privileges remotely without user interaction. This can result in interception or manipulation of sensitive communications, disruption of cellular connectivity, and potential pivoting into other device components or networks. For enterprises, this could mean exposure of confidential corporate communications, disruption of mobile workforce connectivity, and increased risk of espionage or sabotage. For telecom operators, rogue base stations exploiting this vulnerability could undermine network integrity and customer trust. The broad range of affected chipsets, embedded in many smartphones, IoT devices, and other cellular-enabled hardware, amplifies the potential scale of impact globally. The absence of known exploits currently provides a window for mitigation, but the ease of exploitation and high severity score indicate that attackers could develop exploits rapidly once details become widespread.
Mitigation Recommendations
1. Apply official patches from MediaTek as soon as they become available, specifically addressing Patch ID MOLY01123853. 2. Coordinate with device manufacturers and mobile network operators to expedite firmware updates on affected devices. 3. Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 4. Encourage users to avoid connecting to untrusted or unknown cellular networks, especially in high-risk environments. 5. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device security posture. 6. For critical infrastructure relying on cellular connectivity, consider deploying multi-factor authentication and encryption at higher protocol layers to mitigate potential data interception. 7. Monitor security advisories from MediaTek and related vendors for updates and additional mitigation guidance. 8. Conduct penetration testing and security assessments focusing on cellular network interfaces to identify potential exploitation attempts.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.383Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b52c73ad5a09ad00c8fc2d
Added to database: 9/1/2025, 5:17:39 AM
Last enriched: 2/27/2026, 12:29:58 AM
Last updated: 3/25/2026, 3:10:20 AM
Views: 196
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.