Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20755: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20755cvecve-2025-20755cwe-476
Published: Tue Dec 02 2025 (12/02/2025, 02:34:07 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible application crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00628396; Issue ID: MSV-4775.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:39:43 UTC

Technical Analysis

CVE-2025-20755 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting a broad range of MediaTek modem chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The flaw arises from improper input validation within the modem firmware (Modem NR15), which can cause the modem application to crash when it processes certain malformed inputs received from a base station. An attacker controlling a rogue base station can exploit this by sending crafted signals to a UE (user equipment) that connects to it, triggering the NULL pointer dereference and causing a denial of service condition. This results in loss of modem functionality, impacting device availability. The attack vector is network-based (AV:N), requires low privileges (PR:L) but no user interaction (UI:N), and has a high attack complexity (AC:H) due to the need to operate a rogue base station. The vulnerability does not impact confidentiality or integrity but affects availability (A:H). MediaTek has assigned patch ID MOLY00628396 to address this issue. No public exploits have been reported yet, but the vulnerability is significant given the widespread use of affected chipsets in mobile devices and IoT equipment. The vulnerability was published on December 2, 2025, and is rated medium severity with a CVSS v3.1 score of 5.3.

Potential Impact

For European organizations, this vulnerability can disrupt mobile communications by causing modem crashes and denial of service on devices using affected MediaTek chipsets. This can impact critical sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The ability of an attacker to induce a DoS remotely without user interaction increases risk in environments where rogue base stations could be deployed, such as urban areas, transport hubs, or near sensitive facilities. Disruptions could lead to loss of service, operational delays, and potential safety risks. Although confidentiality and integrity are not directly affected, availability impacts could cascade into broader operational challenges. The medium severity rating suggests moderate urgency but given the critical role of mobile connectivity, timely mitigation is essential to maintain service continuity.

Mitigation Recommendations

European organizations should prioritize updating affected devices with the MediaTek patch MOLY00628396 as soon as it becomes available from device manufacturers or vendors. Network operators should enhance detection and prevention mechanisms for rogue base stations, including deploying radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Device manufacturers and integrators should verify firmware versions and ensure secure update mechanisms are in place to facilitate rapid patch deployment. Organizations should also implement network segmentation and restrict sensitive communications to trusted networks where possible. User awareness campaigns can help identify unusual connectivity issues that may indicate exploitation attempts. Collaboration with telecom providers to share threat intelligence on rogue base stations and suspicious activity can further reduce risk. Finally, maintaining an inventory of devices using affected MediaTek chipsets will help prioritize remediation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5f05

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/9/2025, 4:39:43 AM

Last updated: 1/19/2026, 7:54:48 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats