Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20725: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

0
High
VulnerabilityCVE-2025-20725cvecve-2025-20725cwe-787
Published: Tue Nov 04 2025 (11/04/2025, 06:19:43 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

Description

In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.

AI-Powered Analysis

AILast updated: 11/04/2025, 06:48:26 UTC

Technical Analysis

CVE-2025-20725 is a critical vulnerability classified as an out-of-bounds write (CWE-787) found in the IMS (IP Multimedia Subsystem) service of a wide range of MediaTek chipsets spanning from MT2735 to MT8893 series. The root cause is a missing bounds check in the IMS service code, which allows an attacker who controls a rogue base station to perform a remote escalation of privilege on a connected user equipment (UE) device. This vulnerability does not require any additional execution privileges or user interaction, making it highly exploitable in real-world scenarios where attackers can deploy malicious base stations. The affected modem firmware versions include LR12A, NR15, and NR16. The vulnerability could allow attackers to write outside the intended memory bounds, potentially leading to arbitrary code execution, system instability, or compromise of sensitive data on the device. Although no known exploits have been reported in the wild, the broad range of affected chipsets and the critical nature of the IMS service—which handles voice, video, and messaging over IP—make this a significant threat. The issue was reserved in November 2024 and published in November 2025, with MediaTek identifying the patch under ID MOLY01671924 and issue MSV-4620. The vulnerability impacts the confidentiality, integrity, and availability of affected devices and can be leveraged remotely without user interaction, increasing its risk profile.

Potential Impact

For European organizations, this vulnerability poses a serious risk to mobile devices and telecommunications infrastructure that rely on MediaTek chipsets. The IMS service is integral to voice, video, and messaging services over IP networks, so exploitation could lead to unauthorized privilege escalation, device compromise, and interception or manipulation of communications. This could affect enterprise mobile devices, IoT devices, and network equipment using these chipsets, potentially leading to data breaches, espionage, or disruption of critical communications. The ability to exploit the vulnerability remotely via a rogue base station means attackers could target devices in public or corporate environments without physical access. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure in Europe, where secure communications are essential. The lack of user interaction required for exploitation increases the likelihood of successful attacks. Additionally, compromised devices could be used as footholds for lateral movement within corporate networks or for launching further attacks.

Mitigation Recommendations

1. Immediate deployment of the official MediaTek patch (MOLY01671924) for affected modem firmware versions LR12A, NR15, and NR16 is critical. 2. Network operators and enterprises should implement detection and mitigation mechanisms for rogue base stations, including monitoring for anomalous base station behavior and unauthorized cell towers. 3. Enhance UE base station authentication and validation processes to prevent connections to untrusted or malicious base stations. 4. Employ mobile device management (MDM) solutions to enforce timely firmware updates and monitor device integrity. 5. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in public or high-risk areas. 6. Collaborate with telecom providers to ensure network-level protections and rapid incident response capabilities. 7. Conduct regular security audits and penetration testing focused on mobile device and network infrastructure vulnerabilities related to IMS and base station interactions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f0d

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 11/4/2025, 6:48:26 AM

Last updated: 11/4/2025, 10:52:43 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats