CVE-2025-20726: CWE-122 Heap Overflow in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622.
AI Analysis
Technical Summary
CVE-2025-20726 is a heap overflow vulnerability (CWE-122) identified in the modem firmware of a wide range of MediaTek chipsets, including models MT2735 through MT8893 series. The root cause is an incorrect bounds check in the modem's code, which allows an out-of-bounds write to occur. This memory corruption can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. The attacker can exploit this flaw to escalate privileges on the device without requiring any additional execution privileges or user interaction, making the attack vector highly accessible. The affected modem firmware versions are LR12A, NR15, NR16, NR17, and NR17R. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing attackers to execute arbitrary code or disrupt modem operations. The CVSS v3.1 score is 7.5, reflecting a high severity with network attack vector, high impact on all security properties, but requiring low privileges and high attack complexity. No public exploits have been reported yet, but the broad chipset coverage and remote exploitation capability make this a critical concern for mobile device security. The vulnerability was reserved in November 2024 and published in November 2025, with patches expected from MediaTek though no direct patch links are provided in the data.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of MediaTek chipsets in smartphones, IoT devices, and embedded systems. Attackers controlling rogue base stations could remotely compromise devices without user interaction, leading to unauthorized access to sensitive communications, data leakage, or device disruption. Critical sectors such as finance, government, healthcare, and telecommunications could be targeted to intercept or manipulate communications. The vulnerability could also undermine trust in mobile networks and complicate compliance with data protection regulations like GDPR if personal data is compromised. Additionally, the potential for privilege escalation on devices could facilitate further lateral movement or persistent access within organizational networks. The risk is amplified in environments where devices connect to untrusted or public cellular networks, common in enterprise mobility scenarios.
Mitigation Recommendations
Organizations should prioritize deploying firmware updates from device manufacturers that incorporate MediaTek's patches for the affected modem versions. Since direct patch links are not provided, coordination with device vendors and carriers is essential to ensure timely updates. Network operators and enterprises should implement detection and blocking mechanisms for rogue base stations using radio frequency monitoring tools and anomaly detection systems. Employing mobile threat defense (MTD) solutions that can identify suspicious network behavior can further reduce risk. Restricting device connectivity to trusted networks and educating users about the dangers of connecting to unknown cellular networks can help mitigate exposure. For high-risk environments, consider using devices with alternative chipsets or additional security layers. Regular security assessments and penetration testing focusing on mobile device security posture will help identify residual risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-20726: CWE-122 Heap Overflow in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672598; Issue ID: MSV-4622.
AI-Powered Analysis
Technical Analysis
CVE-2025-20726 is a heap overflow vulnerability (CWE-122) identified in the modem firmware of a wide range of MediaTek chipsets, including models MT2735 through MT8893 series. The root cause is an incorrect bounds check in the modem's code, which allows an out-of-bounds write to occur. This memory corruption can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. The attacker can exploit this flaw to escalate privileges on the device without requiring any additional execution privileges or user interaction, making the attack vector highly accessible. The affected modem firmware versions are LR12A, NR15, NR16, NR17, and NR17R. The vulnerability impacts confidentiality, integrity, and availability by potentially allowing attackers to execute arbitrary code or disrupt modem operations. The CVSS v3.1 score is 7.5, reflecting a high severity with network attack vector, high impact on all security properties, but requiring low privileges and high attack complexity. No public exploits have been reported yet, but the broad chipset coverage and remote exploitation capability make this a critical concern for mobile device security. The vulnerability was reserved in November 2024 and published in November 2025, with patches expected from MediaTek though no direct patch links are provided in the data.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of MediaTek chipsets in smartphones, IoT devices, and embedded systems. Attackers controlling rogue base stations could remotely compromise devices without user interaction, leading to unauthorized access to sensitive communications, data leakage, or device disruption. Critical sectors such as finance, government, healthcare, and telecommunications could be targeted to intercept or manipulate communications. The vulnerability could also undermine trust in mobile networks and complicate compliance with data protection regulations like GDPR if personal data is compromised. Additionally, the potential for privilege escalation on devices could facilitate further lateral movement or persistent access within organizational networks. The risk is amplified in environments where devices connect to untrusted or public cellular networks, common in enterprise mobility scenarios.
Mitigation Recommendations
Organizations should prioritize deploying firmware updates from device manufacturers that incorporate MediaTek's patches for the affected modem versions. Since direct patch links are not provided, coordination with device vendors and carriers is essential to ensure timely updates. Network operators and enterprises should implement detection and blocking mechanisms for rogue base stations using radio frequency monitoring tools and anomaly detection systems. Employing mobile threat defense (MTD) solutions that can identify suspicious network behavior can further reduce risk. Restricting device connectivity to trusted networks and educating users about the dangers of connecting to unknown cellular networks can help mitigate exposure. For high-risk environments, consider using devices with alternative chipsets or additional security layers. Regular security assessments and penetration testing focusing on mobile device security posture will help identify residual risks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.392Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6909a1a6d66f5e62e3848f10
Added to database: 11/4/2025, 6:48:06 AM
Last enriched: 11/11/2025, 7:20:58 AM
Last updated: 2/7/2026, 3:56:17 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.