CVE-2025-20753: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
AI Analysis
Technical Summary
CVE-2025-20753 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8797, affecting modem versions NR15 and NR16. The root cause is an uncaught exception within the modem's firmware that can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. This exception leads to a system crash, effectively causing a denial of service (DoS) condition on the affected device. The vulnerability does not require any user interaction or elevated privileges, making it particularly dangerous as attackers can exploit it remotely and silently. The flaw is categorized under CWE-248, which relates to uncaught exceptions that can disrupt normal operation. While no public exploits have been reported yet, the broad range of affected chipsets—commonly integrated into smartphones, IoT devices, and other mobile communication hardware—means the attack surface is extensive. The vulnerability could be leveraged by attackers to disrupt communications, degrade service availability, or target critical infrastructure relying on these modems. MediaTek has acknowledged the issue and assigned a patch ID (MOLY01689252), indicating a fix is available or forthcoming, though no direct patch links are provided. The vulnerability's impact is primarily on availability, with potential cascading effects on dependent services and networks.
Potential Impact
For European organizations, the primary impact of CVE-2025-20753 is the risk of remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, impacting enterprise operations, critical infrastructure, and emergency services that rely on cellular connectivity. Telecommunications providers could face network instability or increased support costs due to device crashes. Enterprises deploying IoT devices with these chipsets may experience operational downtime or data transmission failures. The lack of required user interaction or authentication lowers the barrier for attackers, increasing the likelihood of exploitation in environments where rogue base stations can be deployed, such as urban areas or near critical facilities. This vulnerability could also be exploited for targeted attacks against high-value targets by causing selective communication outages. The broad chipset coverage means many consumer and industrial devices across Europe could be affected, potentially impacting sectors like finance, healthcare, transportation, and government services.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of the MediaTek patch (MOLY01689252) across all affected devices and modems. 2) Implement network monitoring to detect and block rogue base stations or suspicious cellular signals, leveraging IMSI catchers detection tools and anomaly detection systems. 3) Enforce strict mobile device management (MDM) policies to control and update firmware on devices using MediaTek chipsets. 4) Educate security teams about the risk of rogue base stations and encourage reporting of unusual connectivity issues. 5) For critical infrastructure, consider multi-path communication strategies to reduce reliance on a single cellular connection. 6) Collaborate with telecom providers to enhance base station authentication and integrity checks. 7) Maintain an inventory of devices with affected chipsets to assess exposure and prioritize patching. 8) Regularly review and update incident response plans to include scenarios involving cellular network disruptions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20753: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689252; Issue ID: MSV-4841.
AI-Powered Analysis
Technical Analysis
CVE-2025-20753 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8797, affecting modem versions NR15 and NR16. The root cause is an uncaught exception within the modem's firmware that can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. This exception leads to a system crash, effectively causing a denial of service (DoS) condition on the affected device. The vulnerability does not require any user interaction or elevated privileges, making it particularly dangerous as attackers can exploit it remotely and silently. The flaw is categorized under CWE-248, which relates to uncaught exceptions that can disrupt normal operation. While no public exploits have been reported yet, the broad range of affected chipsets—commonly integrated into smartphones, IoT devices, and other mobile communication hardware—means the attack surface is extensive. The vulnerability could be leveraged by attackers to disrupt communications, degrade service availability, or target critical infrastructure relying on these modems. MediaTek has acknowledged the issue and assigned a patch ID (MOLY01689252), indicating a fix is available or forthcoming, though no direct patch links are provided. The vulnerability's impact is primarily on availability, with potential cascading effects on dependent services and networks.
Potential Impact
For European organizations, the primary impact of CVE-2025-20753 is the risk of remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, impacting enterprise operations, critical infrastructure, and emergency services that rely on cellular connectivity. Telecommunications providers could face network instability or increased support costs due to device crashes. Enterprises deploying IoT devices with these chipsets may experience operational downtime or data transmission failures. The lack of required user interaction or authentication lowers the barrier for attackers, increasing the likelihood of exploitation in environments where rogue base stations can be deployed, such as urban areas or near critical facilities. This vulnerability could also be exploited for targeted attacks against high-value targets by causing selective communication outages. The broad chipset coverage means many consumer and industrial devices across Europe could be affected, potentially impacting sectors like finance, healthcare, transportation, and government services.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Coordinate with device manufacturers and mobile network operators to ensure timely deployment of the MediaTek patch (MOLY01689252) across all affected devices and modems. 2) Implement network monitoring to detect and block rogue base stations or suspicious cellular signals, leveraging IMSI catchers detection tools and anomaly detection systems. 3) Enforce strict mobile device management (MDM) policies to control and update firmware on devices using MediaTek chipsets. 4) Educate security teams about the risk of rogue base stations and encourage reporting of unusual connectivity issues. 5) For critical infrastructure, consider multi-path communication strategies to reduce reliance on a single cellular connection. 6) Collaborate with telecom providers to enhance base station authentication and integrity checks. 7) Maintain an inventory of devices with affected chipsets to assess exposure and prioritize patching. 8) Regularly review and update incident response plans to include scenarios involving cellular network disruptions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5eff
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/2/2025, 3:36:34 AM
Last updated: 12/4/2025, 12:05:21 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.