CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.
AI Analysis
Technical Summary
CVE-2025-20708 is a high-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The vulnerability arises from an incorrect bounds check in the modem firmware, which allows an attacker to perform an out-of-bounds write operation. This flaw can be exploited remotely without requiring any user interaction or prior authentication. Specifically, exploitation occurs when a user equipment (UE) device connects to a rogue base station controlled by an attacker. The attacker can leverage this to escalate privileges remotely on the modem, potentially gaining control over modem operations or executing arbitrary code. The vulnerability impacts modem versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 8.1, indicating a high severity level, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be launched remotely over the network, requires high attack complexity, no privileges or user interaction, and results in high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patch links are provided yet, though a patch ID (MOLY01123853) and issue ID (MSV-4131) are referenced by MediaTek. This vulnerability is critical for devices relying on affected MediaTek modems, as it undermines the trustworthiness of cellular communications and could lead to unauthorized access or disruption of mobile network services.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers relying on mobile communications infrastructure or IoT devices using MediaTek modems. Compromise of the modem firmware could lead to interception or manipulation of sensitive communications, unauthorized network access, or disruption of critical services. Industries such as telecommunications, finance, healthcare, and critical infrastructure that depend on secure mobile connectivity could face data breaches, service outages, or espionage. The fact that exploitation requires only connection to a rogue base station means attackers could deploy malicious base stations in public or targeted areas to compromise devices without physical access or user interaction. This elevates the threat in urban and industrial environments where mobile devices are ubiquitous. Additionally, the vulnerability could be leveraged in supply chain attacks or targeted espionage campaigns against high-value targets in Europe. The high confidentiality, integrity, and availability impacts underscore the potential for severe operational and reputational damage.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Prioritize obtaining and deploying firmware updates from device manufacturers and MediaTek as soon as patches become available, referencing the patch ID MOLY01123853. 2) Employ network-level protections to detect and block rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 3) Enforce strict device management policies to restrict use of vulnerable devices in sensitive environments until patched. 4) Collaborate with mobile network operators to enhance detection and mitigation of unauthorized base stations. 5) Conduct regular security assessments and penetration testing focusing on cellular connectivity components. 6) Educate users and administrators about the risks of connecting to untrusted networks and encourage use of VPNs or encrypted communication channels to reduce exposure. 7) For IoT deployments, consider network segmentation and device isolation to limit the impact of compromised modems. 8) Monitor threat intelligence feeds for emerging exploit reports related to this CVE to respond promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01123853; Issue ID: MSV-4131.
AI-Powered Analysis
Technical Analysis
CVE-2025-20708 is a high-severity vulnerability classified as CWE-787 (Out-of-bounds Write) affecting a broad range of MediaTek modem chipsets, including models MT2735 through MT8893 and their variants. The vulnerability arises from an incorrect bounds check in the modem firmware, which allows an attacker to perform an out-of-bounds write operation. This flaw can be exploited remotely without requiring any user interaction or prior authentication. Specifically, exploitation occurs when a user equipment (UE) device connects to a rogue base station controlled by an attacker. The attacker can leverage this to escalate privileges remotely on the modem, potentially gaining control over modem operations or executing arbitrary code. The vulnerability impacts modem versions NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 8.1, indicating a high severity level, with the vector AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be launched remotely over the network, requires high attack complexity, no privileges or user interaction, and results in high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no official patch links are provided yet, though a patch ID (MOLY01123853) and issue ID (MSV-4131) are referenced by MediaTek. This vulnerability is critical for devices relying on affected MediaTek modems, as it undermines the trustworthiness of cellular communications and could lead to unauthorized access or disruption of mobile network services.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for enterprises and service providers relying on mobile communications infrastructure or IoT devices using MediaTek modems. Compromise of the modem firmware could lead to interception or manipulation of sensitive communications, unauthorized network access, or disruption of critical services. Industries such as telecommunications, finance, healthcare, and critical infrastructure that depend on secure mobile connectivity could face data breaches, service outages, or espionage. The fact that exploitation requires only connection to a rogue base station means attackers could deploy malicious base stations in public or targeted areas to compromise devices without physical access or user interaction. This elevates the threat in urban and industrial environments where mobile devices are ubiquitous. Additionally, the vulnerability could be leveraged in supply chain attacks or targeted espionage campaigns against high-value targets in Europe. The high confidentiality, integrity, and availability impacts underscore the potential for severe operational and reputational damage.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Prioritize obtaining and deploying firmware updates from device manufacturers and MediaTek as soon as patches become available, referencing the patch ID MOLY01123853. 2) Employ network-level protections to detect and block rogue base stations using advanced radio frequency monitoring and anomaly detection tools. 3) Enforce strict device management policies to restrict use of vulnerable devices in sensitive environments until patched. 4) Collaborate with mobile network operators to enhance detection and mitigation of unauthorized base stations. 5) Conduct regular security assessments and penetration testing focusing on cellular connectivity components. 6) Educate users and administrators about the risks of connecting to untrusted networks and encourage use of VPNs or encrypted communication channels to reduce exposure. 7) For IoT deployments, consider network segmentation and device isolation to limit the impact of compromised modems. 8) Monitor threat intelligence feeds for emerging exploit reports related to this CVE to respond promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.383Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b52c73ad5a09ad00c8fc2d
Added to database: 9/1/2025, 5:17:39 AM
Last enriched: 9/8/2025, 6:44:35 AM
Last updated: 10/19/2025, 8:58:27 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.