CVE-2025-20753: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
AI Analysis
Technical Summary
CVE-2025-20753 is a vulnerability in MediaTek modem chipsets (including MT2735 through MT8797 series) caused by an uncaught exception within the modem firmware, specifically in versions NR15 and NR16. This uncaught exception can cause the modem system to crash, resulting in a denial of service condition. The vulnerability can be exploited remotely by an attacker who operates a rogue base station; when a user equipment (UE) connects to this malicious base station, the attacker can trigger the exception without requiring any user interaction or additional execution privileges. The vulnerability is classified under CWE-248 (Uncaught Exception), indicating insufficient exception handling in the code. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). The affected products span a broad range of MediaTek modem chipsets widely used in mobile devices and IoT equipment. Although no exploits are known in the wild, the potential for remote denial of service poses risks to device availability and network reliability. A patch identified as MOLY01689252 has been released by MediaTek to address this issue. The vulnerability's exploitation does not allow privilege escalation or data compromise but can disrupt communications by crashing the modem firmware.
Potential Impact
For European organizations, the primary impact of CVE-2025-20753 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can lead to temporary loss of network connectivity, affecting mobile devices, IoT endpoints, and potentially critical infrastructure relying on cellular communications. Telecommunications providers may experience increased support calls and degraded service quality if rogue base stations are deployed by attackers. Enterprises relying on cellular connectivity for operational technology, remote monitoring, or emergency communications could face interruptions. While confidentiality and data integrity are not directly impacted, availability degradation can disrupt business continuity and emergency response capabilities. The wide range of affected chipsets means many consumer and industrial devices across Europe could be vulnerable, especially in sectors with high reliance on cellular networks. The lack of required user interaction and remote exploitability increases the risk of widespread impact if attackers deploy rogue base stations in populated areas or near critical facilities.
Mitigation Recommendations
To mitigate CVE-2025-20753, European organizations should prioritize applying the vendor-provided patch MOLY01689252 to all affected MediaTek modem firmware versions (NR15, NR16). Device manufacturers and service providers should coordinate firmware updates and ensure timely deployment to end-user devices. Network operators should implement detection and mitigation strategies against rogue base stations, including monitoring for unauthorized base station signals and employing network anomaly detection tools. Enterprises should consider network segmentation and fallback communication methods to maintain availability during potential DoS events. Security teams should educate users about the risks of connecting to unknown cellular networks and encourage the use of trusted networks only. Additionally, device manufacturers should review exception handling in modem firmware to prevent similar uncaught exceptions. Continuous monitoring of threat intelligence feeds for emerging exploits targeting this vulnerability is recommended to respond promptly to any active attacks.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-20753: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
AI-Powered Analysis
Technical Analysis
CVE-2025-20753 is a vulnerability in MediaTek modem chipsets (including MT2735 through MT8797 series) caused by an uncaught exception within the modem firmware, specifically in versions NR15 and NR16. This uncaught exception can cause the modem system to crash, resulting in a denial of service condition. The vulnerability can be exploited remotely by an attacker who operates a rogue base station; when a user equipment (UE) connects to this malicious base station, the attacker can trigger the exception without requiring any user interaction or additional execution privileges. The vulnerability is classified under CWE-248 (Uncaught Exception), indicating insufficient exception handling in the code. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). The affected products span a broad range of MediaTek modem chipsets widely used in mobile devices and IoT equipment. Although no exploits are known in the wild, the potential for remote denial of service poses risks to device availability and network reliability. A patch identified as MOLY01689252 has been released by MediaTek to address this issue. The vulnerability's exploitation does not allow privilege escalation or data compromise but can disrupt communications by crashing the modem firmware.
Potential Impact
For European organizations, the primary impact of CVE-2025-20753 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can lead to temporary loss of network connectivity, affecting mobile devices, IoT endpoints, and potentially critical infrastructure relying on cellular communications. Telecommunications providers may experience increased support calls and degraded service quality if rogue base stations are deployed by attackers. Enterprises relying on cellular connectivity for operational technology, remote monitoring, or emergency communications could face interruptions. While confidentiality and data integrity are not directly impacted, availability degradation can disrupt business continuity and emergency response capabilities. The wide range of affected chipsets means many consumer and industrial devices across Europe could be vulnerable, especially in sectors with high reliance on cellular networks. The lack of required user interaction and remote exploitability increases the risk of widespread impact if attackers deploy rogue base stations in populated areas or near critical facilities.
Mitigation Recommendations
To mitigate CVE-2025-20753, European organizations should prioritize applying the vendor-provided patch MOLY01689252 to all affected MediaTek modem firmware versions (NR15, NR16). Device manufacturers and service providers should coordinate firmware updates and ensure timely deployment to end-user devices. Network operators should implement detection and mitigation strategies against rogue base stations, including monitoring for unauthorized base station signals and employing network anomaly detection tools. Enterprises should consider network segmentation and fallback communication methods to maintain availability during potential DoS events. Security teams should educate users about the risks of connecting to unknown cellular networks and encourage the use of trusted networks only. Additionally, device manufacturers should review exception handling in modem firmware to prevent similar uncaught exceptions. Continuous monitoring of threat intelligence feeds for emerging exploits targeting this vulnerability is recommended to respond promptly to any active attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5eff
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/9/2025, 4:37:59 AM
Last updated: 1/17/2026, 1:09:43 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15530: Reachable Assertion in Open5GS
MediumCVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM
MediumCVE-2025-8615: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cubewp1211 CubeWP Framework
MediumCVE-2025-14078: CWE-862 Missing Authorization in shoheitanaka PAYGENT for WooCommerce
MediumCVE-2025-10484: CWE-288 Authentication Bypass Using an Alternate Path or Channel in FmeAddons Registration & Login with Mobile Phone Number for WooCommerce
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.