CVE-2025-20755: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.
AI Analysis
Technical Summary
CVE-2025-20755 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting a broad range of MediaTek modem chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The flaw arises from improper input validation within the modem firmware (Modem NR15), which can cause the modem application to crash when it processes certain malformed inputs received from a base station. An attacker controlling a rogue base station can exploit this by sending crafted signals to a UE (user equipment) that connects to it, triggering the NULL pointer dereference and causing a denial of service condition. This results in loss of modem functionality, impacting device availability. The attack vector is network-based (AV:N), requires low privileges (PR:L) but no user interaction (UI:N), and has a high attack complexity (AC:H) due to the need to operate a rogue base station. The vulnerability does not impact confidentiality or integrity but affects availability (A:H). MediaTek has assigned patch ID MOLY00628396 to address this issue. No public exploits have been reported yet, but the vulnerability is significant given the widespread use of affected chipsets in mobile devices and IoT equipment. The vulnerability was published on December 2, 2025, and is rated medium severity with a CVSS v3.1 score of 5.3.
Potential Impact
For European organizations, this vulnerability can disrupt mobile communications by causing modem crashes and denial of service on devices using affected MediaTek chipsets. This can impact critical sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The ability of an attacker to induce a DoS remotely without user interaction increases risk in environments where rogue base stations could be deployed, such as urban areas, transport hubs, or near sensitive facilities. Disruptions could lead to loss of service, operational delays, and potential safety risks. Although confidentiality and integrity are not directly affected, availability impacts could cascade into broader operational challenges. The medium severity rating suggests moderate urgency but given the critical role of mobile connectivity, timely mitigation is essential to maintain service continuity.
Mitigation Recommendations
European organizations should prioritize updating affected devices with the MediaTek patch MOLY00628396 as soon as it becomes available from device manufacturers or vendors. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Device manufacturers and integrators should verify firmware versions and ensure secure update mechanisms are in place to facilitate rapid patch deployment. Organizations should also implement network segmentation and restrict sensitive communications to trusted networks where possible. User awareness campaigns can help identify unusual connectivity issues that may indicate exploitation attempts. Collaboration with telecom providers to share threat intelligence on rogue base stations and suspicious activity can further reduce risk. Finally, maintaining an inventory of devices using affected MediaTek chipsets will help prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20755: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.
AI-Powered Analysis
Technical Analysis
CVE-2025-20755 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting a broad range of MediaTek modem chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The flaw arises from improper input validation within the modem firmware (Modem NR15), which can cause the modem application to crash when it processes certain malformed inputs received from a base station. An attacker controlling a rogue base station can exploit this by sending crafted signals to a UE (user equipment) that connects to it, triggering the NULL pointer dereference and causing a denial of service condition. This results in loss of modem functionality, impacting device availability. The attack vector is network-based (AV:N), requires low privileges (PR:L) but no user interaction (UI:N), and has a high attack complexity (AC:H) due to the need to operate a rogue base station. The vulnerability does not impact confidentiality or integrity but affects availability (A:H). MediaTek has assigned patch ID MOLY00628396 to address this issue. No public exploits have been reported yet, but the vulnerability is significant given the widespread use of affected chipsets in mobile devices and IoT equipment. The vulnerability was published on December 2, 2025, and is rated medium severity with a CVSS v3.1 score of 5.3.
Potential Impact
For European organizations, this vulnerability can disrupt mobile communications by causing modem crashes and denial of service on devices using affected MediaTek chipsets. This can impact critical sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The ability of an attacker to induce a DoS remotely without user interaction increases risk in environments where rogue base stations could be deployed, such as urban areas, transport hubs, or near sensitive facilities. Disruptions could lead to loss of service, operational delays, and potential safety risks. Although confidentiality and integrity are not directly affected, availability impacts could cascade into broader operational challenges. The medium severity rating suggests moderate urgency but given the critical role of mobile connectivity, timely mitigation is essential to maintain service continuity.
Mitigation Recommendations
European organizations should prioritize updating affected devices with the MediaTek patch MOLY00628396 as soon as it becomes available from device manufacturers or vendors. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Device manufacturers and integrators should verify firmware versions and ensure secure update mechanisms are in place to facilitate rapid patch deployment. Organizations should also implement network segmentation and restrict sensitive communications to trusted networks where possible. User awareness campaigns can help identify unusual connectivity issues that may indicate exploitation attempts. Collaboration with telecom providers to share threat intelligence on rogue base stations and suspicious activity can further reduce risk. Finally, maintaining an inventory of devices using affected MediaTek chipsets will help prioritize remediation efforts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f05
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/9/2025, 4:39:43 AM
Last updated: 1/19/2026, 7:54:48 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumCVE-2026-1140: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.