Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20752: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8676, MT8791T

0
Medium
VulnerabilityCVE-2025-20752cvecve-2025-20752cwe-617
Published: Tue Dec 02 2025 (12/02/2025, 02:34:18 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8676, MT8791T

Description

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01270690; Issue ID: MSV-4301.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:36:45 UTC

Technical Analysis

CVE-2025-20752 is a security vulnerability classified under CWE-617 (Reachable Assertion) affecting numerous MediaTek modem chipsets, including models MT2735 through MT8791T. The vulnerability stems from a missing bounds check in the modem firmware, which can cause the system to hit an assertion failure and crash. This flaw can be triggered remotely without any user interaction or elevated privileges by forcing a user equipment (UE) to connect to a maliciously controlled rogue base station. The attack vector exploits the modem's handling of network signals and data, leading to a denial of service (DoS) condition by crashing the modem subsystem. The affected modem versions include NR15, NR16, NR17, and NR17R firmware releases. Although no exploits have been reported in the wild, the vulnerability poses a significant risk to the availability of mobile devices and services relying on these chipsets. The issue was reserved in November 2024 and published in December 2025, with a patch identified internally (MOLY01270690; Issue ID MSV-4301), though no public patch link is provided. This vulnerability is particularly concerning because it requires no user interaction and no additional execution privileges, making it easier to exploit in hostile network environments. The broad range of affected chipsets indicates a widespread potential impact across many device manufacturers using MediaTek modems.

Potential Impact

For European organizations, this vulnerability could disrupt mobile communications by causing modem crashes and denial of service on devices using affected MediaTek chipsets. Critical sectors such as telecommunications providers, emergency services, and enterprises relying on mobile connectivity for operations could experience outages or degraded service quality. The ability to trigger the vulnerability remotely via rogue base stations means attackers could target specific geographic areas or user groups, potentially impacting mobile network reliability and availability. This could also affect IoT devices, industrial control systems, and mobile endpoints that incorporate these modems, leading to broader operational disruptions. The lack of required user interaction or elevated privileges lowers the barrier for exploitation, increasing the risk of widespread attacks. Additionally, the presence of rogue base stations in urban or high-value areas could facilitate targeted denial of service campaigns against key infrastructure or organizations. The vulnerability may also undermine trust in mobile network security and complicate compliance with European data protection and service availability regulations.

Mitigation Recommendations

European organizations should prioritize obtaining and deploying the official firmware updates from device manufacturers or MediaTek as soon as they become available to address this vulnerability. Network operators should enhance detection and mitigation capabilities against rogue base stations by implementing advanced base station authentication, anomaly detection, and signal monitoring tools. Enterprises should consider deploying mobile threat defense solutions that can detect suspicious network behavior and isolate affected devices. For critical infrastructure and sensitive environments, restricting device connectivity to trusted networks and employing network segmentation can reduce exposure. Security teams should monitor for unusual modem crashes or connectivity issues that may indicate exploitation attempts. Collaboration with mobile network operators to share threat intelligence and coordinate responses to rogue base station activity is recommended. Additionally, organizations should review device procurement policies to assess the risk associated with MediaTek-based devices and consider alternative hardware if feasible. Finally, raising user awareness about the risks of connecting to untrusted networks can help reduce inadvertent exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5efc

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/2/2025, 3:36:45 AM

Last updated: 12/4/2025, 1:23:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats