Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20750: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20750cvecve-2025-20750cwe-476
Published: Tue Dec 02 2025 (12/02/2025, 02:34:23 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661199; Issue ID: MSV-4296.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:37:28 UTC

Technical Analysis

CVE-2025-20750 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) found in MediaTek modem chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The flaw arises from improper input validation in the modem firmware (version NR15), which can cause the system to dereference a NULL pointer leading to a crash. This crash results in a denial of service condition on the modem, disrupting network connectivity. The attack vector requires the UE to connect to a rogue base station controlled by an attacker, which can send malformed inputs triggering the vulnerability. No additional privileges or user interaction are necessary, making exploitation feasible in environments where attackers can deploy or simulate base stations. The CVSS v3.1 score is 5.3 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high impact on availability. MediaTek has assigned patch ID MOLY01661199 to resolve the issue. While no exploits have been observed in the wild, the vulnerability poses a risk to device stability and service continuity, especially in critical communication scenarios.

Potential Impact

For European organizations, the primary impact is a potential denial of service on devices using affected MediaTek modems, which could disrupt mobile communications and IoT operations relying on these chipsets. This could affect sectors such as telecommunications providers, critical infrastructure, transportation, and enterprises using mobile broadband or embedded cellular devices. The disruption caused by modem crashes could lead to loss of connectivity, impacting operational continuity and potentially safety-critical systems. Since exploitation requires proximity to the victim device to operate a rogue base station, the threat is more pronounced in urban or high-value target environments where attackers might deploy such infrastructure. The lack of confidentiality or integrity impact reduces risks of data breaches but availability degradation can still have significant operational consequences. Organizations relying on mobile networks with MediaTek modems should assess their exposure and update devices promptly to maintain service reliability.

Mitigation Recommendations

1. Apply the official MediaTek patch MOLY01661199 as soon as it becomes available and is integrated into device firmware updates. 2. Network operators and device manufacturers should prioritize rolling out firmware updates to all affected devices, especially those deployed in critical infrastructure or enterprise environments. 3. Implement network monitoring to detect and alert on the presence of rogue base stations or suspicious base station behavior within organizational premises or sensitive areas. 4. Employ baseband firewall or modem security features where available to restrict connections to trusted base stations only. 5. Educate security teams and mobile users about the risks of connecting to unknown or untrusted cellular networks, particularly in high-risk locations. 6. For IoT deployments, consider device management solutions that can enforce firmware updates and monitor device connectivity status to detect anomalies indicative of modem crashes. 7. Collaborate with telecom providers to ensure network-level protections against rogue base stations are in place and effective.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.396Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5ef6

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/9/2025, 4:37:28 AM

Last updated: 1/18/2026, 9:58:29 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats