CVE-2025-20725: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.
AI Analysis
Technical Summary
CVE-2025-20725 is a critical vulnerability classified as an out-of-bounds write (CWE-787) found in the IMS (IP Multimedia Subsystem) service of a wide range of MediaTek chipsets spanning from MT2735 to MT8893 series. The root cause is a missing bounds check in the IMS service code, which allows an attacker who controls a rogue base station to perform a remote escalation of privilege on a connected user equipment (UE) device. This vulnerability does not require any additional execution privileges or user interaction, making it highly exploitable in real-world scenarios where attackers can deploy malicious base stations. The affected modem firmware versions include LR12A, NR15, and NR16. The vulnerability could allow attackers to write outside the intended memory bounds, potentially leading to arbitrary code execution, system instability, or compromise of sensitive data on the device. Although no known exploits have been reported in the wild, the broad range of affected chipsets and the critical nature of the IMS service—which handles voice, video, and messaging over IP—make this a significant threat. The issue was reserved in November 2024 and published in November 2025, with MediaTek identifying the patch under ID MOLY01671924 and issue MSV-4620. The vulnerability impacts the confidentiality, integrity, and availability of affected devices and can be leveraged remotely without user interaction, increasing its risk profile.
Potential Impact
For European organizations, this vulnerability poses a serious risk to mobile devices and telecommunications infrastructure that rely on MediaTek chipsets. The IMS service is integral to voice, video, and messaging services over IP networks, so exploitation could lead to unauthorized privilege escalation, device compromise, and interception or manipulation of communications. This could affect enterprise mobile devices, IoT devices, and network equipment using these chipsets, potentially leading to data breaches, espionage, or disruption of critical communications. The ability to exploit the vulnerability remotely via a rogue base station means attackers could target devices in public or corporate environments without physical access. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure in Europe, where secure communications are essential. The lack of user interaction required for exploitation increases the likelihood of successful attacks. Additionally, compromised devices could be used as footholds for lateral movement within corporate networks or for launching further attacks.
Mitigation Recommendations
1. Immediate deployment of the official MediaTek patch (MOLY01671924) for affected modem firmware versions LR12A, NR15, and NR16 is critical. 2. Network operators and enterprises should implement detection and mitigation mechanisms for rogue base stations, including monitoring for anomalous base station behavior and unauthorized cell towers. 3. Enhance UE base station authentication and validation processes to prevent connections to untrusted or malicious base stations. 4. Employ mobile device management (MDM) solutions to enforce timely firmware updates and monitor device integrity. 5. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in public or high-risk areas. 6. Collaborate with telecom providers to ensure network-level protections and rapid incident response capabilities. 7. Conduct regular security audits and penetration testing focused on mobile device and network infrastructure vulnerabilities related to IMS and base station interactions.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-20725: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
Description
In ims service, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01671924; Issue ID: MSV-4620.
AI-Powered Analysis
Technical Analysis
CVE-2025-20725 is a critical vulnerability classified as an out-of-bounds write (CWE-787) found in the IMS (IP Multimedia Subsystem) service of a wide range of MediaTek chipsets spanning from MT2735 to MT8893 series. The root cause is a missing bounds check in the IMS service code, which allows an attacker who controls a rogue base station to perform a remote escalation of privilege on a connected user equipment (UE) device. This vulnerability does not require any additional execution privileges or user interaction, making it highly exploitable in real-world scenarios where attackers can deploy malicious base stations. The affected modem firmware versions include LR12A, NR15, and NR16. The vulnerability could allow attackers to write outside the intended memory bounds, potentially leading to arbitrary code execution, system instability, or compromise of sensitive data on the device. Although no known exploits have been reported in the wild, the broad range of affected chipsets and the critical nature of the IMS service—which handles voice, video, and messaging over IP—make this a significant threat. The issue was reserved in November 2024 and published in November 2025, with MediaTek identifying the patch under ID MOLY01671924 and issue MSV-4620. The vulnerability impacts the confidentiality, integrity, and availability of affected devices and can be leveraged remotely without user interaction, increasing its risk profile.
Potential Impact
For European organizations, this vulnerability poses a serious risk to mobile devices and telecommunications infrastructure that rely on MediaTek chipsets. The IMS service is integral to voice, video, and messaging services over IP networks, so exploitation could lead to unauthorized privilege escalation, device compromise, and interception or manipulation of communications. This could affect enterprise mobile devices, IoT devices, and network equipment using these chipsets, potentially leading to data breaches, espionage, or disruption of critical communications. The ability to exploit the vulnerability remotely via a rogue base station means attackers could target devices in public or corporate environments without physical access. This is particularly concerning for sectors such as government, finance, healthcare, and critical infrastructure in Europe, where secure communications are essential. The lack of user interaction required for exploitation increases the likelihood of successful attacks. Additionally, compromised devices could be used as footholds for lateral movement within corporate networks or for launching further attacks.
Mitigation Recommendations
1. Immediate deployment of the official MediaTek patch (MOLY01671924) for affected modem firmware versions LR12A, NR15, and NR16 is critical. 2. Network operators and enterprises should implement detection and mitigation mechanisms for rogue base stations, including monitoring for anomalous base station behavior and unauthorized cell towers. 3. Enhance UE base station authentication and validation processes to prevent connections to untrusted or malicious base stations. 4. Employ mobile device management (MDM) solutions to enforce timely firmware updates and monitor device integrity. 5. Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, especially in public or high-risk areas. 6. Collaborate with telecom providers to ensure network-level protections and rapid incident response capabilities. 7. Conduct regular security audits and penetration testing focused on mobile device and network infrastructure vulnerabilities related to IMS and base station interactions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.392Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6909a1a6d66f5e62e3848f0d
Added to database: 11/4/2025, 6:48:06 AM
Last enriched: 11/4/2025, 6:48:26 AM
Last updated: 11/4/2025, 10:52:43 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62722: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Kovah LinkAce
HighCVE-2025-0942: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Jalios JPlatform
HighCVE-2025-62719: CWE-918: Server-Side Request Forgery (SSRF) in Kovah LinkAce
LowCVE-2025-62721: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce
HighCVE-2025-62720: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Kovah LinkAce
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.