Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20753: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20753cvecve-2025-20753cwe-248
Published: Tue Dec 02 2025 (12/02/2025, 02:34:04 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:37:59 UTC

Technical Analysis

CVE-2025-20753 is a vulnerability in MediaTek modem chipsets (including MT2735 through MT8797 series) caused by an uncaught exception within the modem firmware, specifically in versions NR15 and NR16. This uncaught exception can cause the modem system to crash, resulting in a denial of service condition. The vulnerability can be exploited remotely by an attacker who operates a rogue base station; when a user equipment (UE) connects to this malicious base station, the attacker can trigger the exception without requiring any user interaction or additional execution privileges. The vulnerability is classified under CWE-248 (Uncaught Exception), indicating insufficient exception handling in the code. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector, high attack complexity, low privileges required, no user interaction, and impact limited to availability (no confidentiality or integrity impact). The affected products span a broad range of MediaTek modem chipsets widely used in mobile devices and IoT equipment. Although no exploits are known in the wild, the potential for remote denial of service poses risks to device availability and network reliability. A patch identified as MOLY01689252 has been released by MediaTek to address this issue. The vulnerability's exploitation does not allow privilege escalation or data compromise but can disrupt communications by crashing the modem firmware.

Potential Impact

For European organizations, the primary impact of CVE-2025-20753 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can lead to temporary loss of network connectivity, affecting mobile devices, IoT endpoints, and potentially critical infrastructure relying on cellular communications. Telecommunications providers may experience increased support calls and degraded service quality if rogue base stations are deployed by attackers. Enterprises relying on cellular connectivity for operational technology, remote monitoring, or emergency communications could face interruptions. While confidentiality and data integrity are not directly impacted, availability degradation can disrupt business continuity and emergency response capabilities. The wide range of affected chipsets means many consumer and industrial devices across Europe could be vulnerable, especially in sectors with high reliance on cellular networks. The lack of required user interaction and remote exploitability increases the risk of widespread impact if attackers deploy rogue base stations in populated areas or near critical facilities.

Mitigation Recommendations

To mitigate CVE-2025-20753, European organizations should prioritize applying the vendor-provided patch MOLY01689252 to all affected MediaTek modem firmware versions (NR15, NR16). Device manufacturers and service providers should coordinate firmware updates and ensure timely deployment to end-user devices. Network operators should implement detection and mitigation strategies against rogue base stations, including monitoring for unauthorized base station signals and employing network anomaly detection tools. Enterprises should consider network segmentation and fallback communication methods to maintain availability during potential DoS events. Security teams should educate users about the risks of connecting to unknown cellular networks and encourage the use of trusted networks only. Additionally, device manufacturers should review exception handling in modem firmware to prevent similar uncaught exceptions. Continuous monitoring of threat intelligence feeds for emerging exploits targeting this vulnerability is recommended to respond promptly to any active attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5eff

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/9/2025, 4:37:59 AM

Last updated: 1/17/2026, 1:09:43 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats