Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20727: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20727cvecve-2025-20727cwe-787
Published: Tue Nov 04 2025 (11/04/2025, 06:19:40 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01672601; Issue ID: MSV-4623.

AI-Powered Analysis

AILast updated: 11/04/2025, 06:48:55 UTC

Technical Analysis

CVE-2025-20727 is a critical heap buffer overflow vulnerability identified in the modem firmware of numerous MediaTek chipsets, including models MT2735 through MT8893 series. The root cause is an out-of-bounds write in the modem's memory management, classified under CWE-787. This flaw can be exploited remotely by an attacker operating a rogue base station that a victim's UE connects to, enabling escalation of privileges without requiring user interaction or additional execution rights. The vulnerability affects modem firmware versions LR12A, NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices globally. Successful exploitation could allow attackers to execute arbitrary code within the modem environment, potentially compromising the device's confidentiality, integrity, and availability. This could lead to unauthorized access to sensitive communications, disruption of network services, or persistent device compromise. No public exploits have been reported yet, but the broad range of affected chipsets and ease of exploitation make this a high-risk vulnerability. MediaTek has assigned Patch ID MOLY01672601 and Issue ID MSV-4623 for remediation, though no public patch links are currently available. The vulnerability's remote nature and lack of user interaction requirement increase its threat level, especially in scenarios where attackers can deploy rogue base stations, such as in urban or high-value target areas.

Potential Impact

For European organizations, the impact of CVE-2025-20727 could be substantial, particularly for those relying heavily on mobile communications and IoT devices using MediaTek chipsets. Confidentiality risks include interception or manipulation of sensitive data transmitted via compromised devices. Integrity could be undermined if attackers alter device firmware or network communications, potentially leading to fraudulent transactions or misinformation. Availability may be affected if devices become unstable or unusable due to exploitation. Critical infrastructure sectors such as telecommunications, finance, healthcare, and government agencies could face operational disruptions or data breaches. The ability to exploit this vulnerability remotely without user interaction increases the attack surface, especially in environments where rogue base stations can be deployed, such as public events or urban centers. Additionally, supply chain devices incorporating these chipsets may propagate risks across multiple industries. The lack of known exploits currently provides a window for proactive mitigation, but the widespread deployment of affected chipsets in Europe necessitates urgent attention.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Coordinate with device manufacturers and mobile network operators to obtain and deploy the official MediaTek patch (MOLY01672601) as soon as it becomes available. 2) Implement network-level detection and prevention mechanisms to identify and block rogue base stations, including enhanced monitoring of base station identifiers and anomaly detection in cellular traffic. 3) Enforce strict device management policies to ensure all mobile devices and IoT endpoints using affected chipsets are updated promptly. 4) Educate security teams about the risks of rogue base stations and incorporate this threat into incident response plans. 5) Utilize mobile threat defense solutions capable of detecting suspicious cellular network behavior. 6) Collaborate with telecom providers to enhance network authentication protocols and reduce the feasibility of rogue base station attacks. 7) For high-value targets, consider deploying additional layers of encryption and secure communication channels independent of the cellular modem. 8) Conduct regular security audits and penetration testing focusing on cellular network vulnerabilities. These measures go beyond generic patching by addressing the unique exploitation vector involving rogue base stations and remote privilege escalation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.392Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6909a1a6d66f5e62e3848f13

Added to database: 11/4/2025, 6:48:06 AM

Last enriched: 11/4/2025, 6:48:55 AM

Last updated: 11/5/2025, 9:06:04 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats