Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20725: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

0
High
VulnerabilityCVE-2025-20725cvecve-2025-20725cwe-787
Published: Tue Nov 04 2025 (11/04/2025, 06:19:43 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

Description

In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:20:36 UTC

Technical Analysis

CVE-2025-20725 is an out-of-bounds write vulnerability classified under CWE-787, discovered in the IMS (IP Multimedia Subsystem) service of MediaTek chipsets. The vulnerability arises due to a missing bounds check in the IMS service code, which can lead to memory corruption through an out-of-bounds write operation. This flaw affects a wide range of MediaTek chipsets, including MT2735, MT2737, MT6739, MT6761, MT6762 series, MT6763, MT6765 series, MT6767, MT6768, MT6769 series, MT6771, MT6833 series, MT6853 series, MT6855 series, MT6873 series, MT6875 series, MT6877 series, MT6879, MT6880 series, MT6883, MT6885, MT6886, MT6889, MT6890 series, MT6980 series, MT6983 series, MT6985 series, MT6989 series, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765 series, MT8766 series, MT8768, MT8771, MT8786, MT8788 series, MT8791 series, MT8795T, MT8797, MT8798, and MT8893. The affected modem firmware versions are LR12A, NR15, and NR16. Exploitation occurs remotely when a user equipment (UE) connects to a malicious rogue base station controlled by an attacker, requiring no user interaction or additional execution privileges. Successful exploitation can lead to remote escalation of privilege, enabling the attacker to compromise device confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector network (AV:N), attack complexity high (AC:H), privileges required low (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild. The vendor has assigned patch ID MOLY01671924 and issue ID MSV-4620 for remediation. This vulnerability poses a significant risk to mobile devices using affected MediaTek chipsets, especially in environments where devices may connect to untrusted or rogue cellular base stations.

Potential Impact

For European organizations, the impact of CVE-2025-20725 is substantial due to the widespread use of MediaTek chipsets in consumer and enterprise mobile devices, including smartphones, IoT devices, and embedded systems. The vulnerability enables remote attackers to escalate privileges without user interaction, potentially allowing unauthorized access to sensitive data, disruption of communications, or installation of persistent malware. Critical sectors such as telecommunications, finance, healthcare, and government could face data breaches, service outages, or espionage risks. The ability to exploit this vulnerability via rogue base stations is particularly concerning in urban and industrial environments where attackers could deploy such infrastructure covertly. Additionally, the vulnerability could undermine trust in mobile network security and complicate compliance with European data protection regulations like GDPR if personal data is compromised. The absence of known exploits currently provides a window for proactive defense, but the high severity and ease of remote exploitation necessitate urgent mitigation to prevent potential large-scale attacks.

Mitigation Recommendations

1. Immediate application of vendor-supplied patches (MOLY01671924) to all affected devices and modems running LR12A, NR15, or NR16 firmware versions is critical. 2. Network operators and enterprises should implement detection mechanisms for rogue base stations, including anomaly-based monitoring and radio frequency scanning, to identify and block unauthorized cellular infrastructure. 3. Employ mobile device management (MDM) solutions to enforce firmware updates and restrict device connectivity to trusted networks only. 4. Encourage users to avoid connecting to unknown or suspicious cellular networks, especially in sensitive environments. 5. Collaborate with telecom providers to enhance base station authentication protocols and strengthen IMS security configurations. 6. Conduct regular security audits and penetration testing focusing on mobile network interfaces and IMS components. 7. For IoT deployments using affected chipsets, isolate devices on segmented networks and monitor for unusual behavior indicative of exploitation attempts. 8. Maintain up-to-date threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability. 9. Educate security teams and end-users about the risks of rogue base stations and the importance of timely updates. 10. Consider deploying endpoint detection and response (EDR) tools capable of identifying memory corruption or privilege escalation attempts on mobile devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f0d

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 11/11/2025, 7:20:36 AM

Last updated: 12/20/2025, 12:51:17 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats