Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20756: CWE-1287 Specified Type in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2025-20756cvecve-2025-20756cwe-1287
Published: Tue Dec 02 2025 (12/02/2025, 02:34:16 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673749; Issue ID: MSV-4643.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:39:57 UTC

Technical Analysis

CVE-2025-20756 is a vulnerability identified in multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT8673 series, MT8755, MT8771, MT8791 series, MT8863, MT8873, MT8883, and MT8893. The flaw stems from a logic error within the modem firmware (specifically Modem NR15), which can cause the system to crash when a UE connects to a maliciously controlled rogue base station. This vulnerability does not require user interaction and can be exploited remotely, although it demands low privileges and has a high attack complexity, as indicated by the CVSS vector (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). The primary impact is a denial of service condition, where the modem becomes unresponsive or crashes, potentially disrupting mobile connectivity. The vulnerability is tracked under CWE-1287, which relates to logic errors leading to unintended behavior. No patches are linked yet, but MediaTek has reserved the issue and assigned a patch ID (MOLY01673749). There are no known exploits in the wild at this time. The broad range of affected chipsets indicates a widespread potential impact across many mobile devices using MediaTek modems, commonly found in smartphones, IoT devices, and embedded systems. The vulnerability's exploitation vector involves an attacker setting up a rogue base station to which the victim device connects, triggering the crash without additional privileges or user actions.

Potential Impact

For European organizations, the impact primarily involves potential disruption of mobile communications due to denial of service on devices using affected MediaTek modems. Telecom operators may experience increased support calls or service degradation if customers' devices crash unexpectedly. Critical infrastructure sectors relying on mobile connectivity for operational continuity, such as emergency services, transportation, and utilities, could face operational challenges. Enterprises with mobile workforces using affected devices might see productivity losses. The lack of confidentiality or integrity impact limits data breach risks, but availability disruption can have cascading effects on business operations and public safety. The requirement for connection to a rogue base station means targeted attacks are possible in localized areas, potentially affecting high-value targets or strategic locations. Given the widespread use of MediaTek chipsets in consumer and industrial devices, the scope of affected systems is significant, increasing the risk of large-scale service interruptions if exploited.

Mitigation Recommendations

Organizations should prioritize obtaining and applying official patches from MediaTek or device manufacturers as soon as they become available. In the interim, network operators and security teams should implement detection mechanisms for rogue base stations using radio frequency monitoring tools and anomaly detection systems. Mobile device management (MDM) solutions can enforce policies restricting connections to untrusted networks where feasible. Educating users about the risks of connecting to unknown or suspicious cellular networks can reduce exposure. Telecom providers should enhance their network authentication and validation processes to prevent rogue base station attacks. Incident response plans should include procedures for handling sudden mobile connectivity loss. Collaboration with vendors to receive timely vulnerability intelligence and firmware updates is critical. For critical infrastructure, deploying redundant communication channels and failover mechanisms can mitigate availability risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5f08

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/9/2025, 4:39:57 AM

Last updated: 1/18/2026, 2:27:46 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats