Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20755: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20755cvecve-2025-20755cwe-476
Published: Tue Dec 02 2025 (12/02/2025, 02:34:07 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:27:25 UTC

Technical Analysis

CVE-2025-20755 is a security vulnerability classified as CWE-476 (NULL Pointer Dereference) affecting a broad range of MediaTek modem chipsets, including MT2735, MT6833, MT6853, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8797, and their variants. The vulnerability resides in the modem firmware, specifically in the NR15 modem version, where improper input validation can cause the modem application to dereference a NULL pointer, leading to a crash. This crash results in a remote denial of service condition on the affected device. The attack vector requires the victim device (User Equipment) to connect to a rogue base station controlled by an attacker, which can send malformed inputs triggering the vulnerability. No additional execution privileges or user interaction are needed, making exploitation feasible in scenarios where an attacker can simulate or control a base station environment. The vulnerability was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No known exploits are currently reported in the wild. The vendor has released a patch identified as MOLY00628396 to address the issue. This vulnerability impacts the availability of devices using these MediaTek modems, potentially disrupting mobile communications and services relying on them.

Potential Impact

For European organizations, the primary impact of CVE-2025-20755 is the potential for remote denial of service on devices equipped with affected MediaTek modems. This can disrupt mobile communications, affecting both enterprise mobile endpoints and telecom infrastructure that utilize these chipsets. Critical sectors such as telecommunications providers, emergency services, and enterprises relying on mobile connectivity could experience service interruptions. The requirement for a rogue base station means the threat is more likely in targeted attack scenarios or areas with sophisticated attackers capable of deploying such infrastructure. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the attack surface. Disruptions could lead to operational downtime, loss of connectivity, and potential cascading effects on business continuity and safety-critical communications.

Mitigation Recommendations

To mitigate CVE-2025-20755, European organizations should prioritize the following actions: 1) Deploy the official patch MOLY00628396 from MediaTek as soon as possible to affected devices and firmware versions. 2) Implement network monitoring to detect and block rogue base stations or suspicious radio access points, leveraging anomaly detection and telecom security solutions. 3) Enforce strict device management policies to ensure only updated and verified devices connect to corporate networks. 4) Collaborate with mobile network operators to enhance detection and mitigation of unauthorized base stations. 5) Educate security teams about the risk of rogue base stations and the importance of physical and radio environment security. 6) For critical infrastructure, consider deploying redundant communication paths and failover mechanisms to reduce impact from potential DoS conditions. 7) Maintain an inventory of devices using affected MediaTek modems to assess exposure and prioritize remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5f05

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/2/2025, 3:27:25 AM

Last updated: 12/4/2025, 8:29:35 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats