CVE-2025-20757: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673751; Issue ID: MSV-4644.
AI Analysis
Technical Summary
CVE-2025-20757 identifies a reachable assertion vulnerability (CWE-617) in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, and MT8797. The vulnerability stems from improper input validation within the modem's handling of network signals, specifically when a user equipment (UE) connects to a base station. An attacker controlling a rogue base station can send crafted signals that trigger an assertion failure in the modem firmware, causing the system to crash and resulting in a denial of service condition. This can be exploited remotely without requiring user interaction or elevated privileges, increasing the attack surface significantly. The affected modem versions are identified as Modem NR15. The flaw was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No public exploits have been reported, but the vulnerability’s characteristics suggest it could disrupt mobile communications and dependent services. The issue is tracked internally by MediaTek as MSV-4644 and patched under MOLY01673751, though patch availability and deployment status remain unspecified. The vulnerability impacts confidentiality minimally but poses a high risk to availability, particularly for devices relying on these modems for cellular connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2025-20757 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting enterprise mobile devices, IoT deployments, and critical infrastructure relying on cellular connectivity. Telecommunications providers could face network instability or customer service degradation if rogue base stations are deployed maliciously or accidentally. Industries such as finance, healthcare, transportation, and emergency services that depend on reliable mobile networks may experience operational interruptions. The lack of required user interaction or elevated privileges means attackers can exploit this vulnerability stealthily, increasing the risk of widespread service outages. Additionally, the presence of rogue base stations is a known tactic in advanced persistent threat (APT) campaigns, raising concerns about targeted attacks against high-value European entities. The impact on confidentiality and integrity is limited; however, availability degradation alone can have severe consequences in sectors requiring continuous connectivity.
Mitigation Recommendations
To mitigate CVE-2025-20757, European organizations should prioritize the following actions: 1) Monitor vendor communications closely for the release of official patches (MOLY01673751) and apply them promptly to affected devices. 2) Implement network-level detection and prevention systems capable of identifying and blocking rogue base stations or suspicious cellular signals, leveraging IMSI catchers detection tools and anomaly-based monitoring. 3) Employ device management policies that restrict connections to untrusted or unknown base stations, where feasible. 4) Collaborate with mobile network operators to enhance network security and share threat intelligence regarding rogue base station activity. 5) For critical deployments, consider using multi-factor connectivity solutions that combine cellular with other communication channels to maintain availability during attacks. 6) Conduct regular security assessments and penetration testing focused on cellular network vulnerabilities. 7) Educate staff about the risks of rogue base stations and encourage reporting of unusual connectivity issues. These targeted measures go beyond generic patching and help reduce the attack surface and impact of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20757: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673751; Issue ID: MSV-4644.
AI-Powered Analysis
Technical Analysis
CVE-2025-20757 identifies a reachable assertion vulnerability (CWE-617) in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, and MT8797. The vulnerability stems from improper input validation within the modem's handling of network signals, specifically when a user equipment (UE) connects to a base station. An attacker controlling a rogue base station can send crafted signals that trigger an assertion failure in the modem firmware, causing the system to crash and resulting in a denial of service condition. This can be exploited remotely without requiring user interaction or elevated privileges, increasing the attack surface significantly. The affected modem versions are identified as Modem NR15. The flaw was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No public exploits have been reported, but the vulnerability’s characteristics suggest it could disrupt mobile communications and dependent services. The issue is tracked internally by MediaTek as MSV-4644 and patched under MOLY01673751, though patch availability and deployment status remain unspecified. The vulnerability impacts confidentiality minimally but poses a high risk to availability, particularly for devices relying on these modems for cellular connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2025-20757 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting enterprise mobile devices, IoT deployments, and critical infrastructure relying on cellular connectivity. Telecommunications providers could face network instability or customer service degradation if rogue base stations are deployed maliciously or accidentally. Industries such as finance, healthcare, transportation, and emergency services that depend on reliable mobile networks may experience operational interruptions. The lack of required user interaction or elevated privileges means attackers can exploit this vulnerability stealthily, increasing the risk of widespread service outages. Additionally, the presence of rogue base stations is a known tactic in advanced persistent threat (APT) campaigns, raising concerns about targeted attacks against high-value European entities. The impact on confidentiality and integrity is limited; however, availability degradation alone can have severe consequences in sectors requiring continuous connectivity.
Mitigation Recommendations
To mitigate CVE-2025-20757, European organizations should prioritize the following actions: 1) Monitor vendor communications closely for the release of official patches (MOLY01673751) and apply them promptly to affected devices. 2) Implement network-level detection and prevention systems capable of identifying and blocking rogue base stations or suspicious cellular signals, leveraging IMSI catchers detection tools and anomaly-based monitoring. 3) Employ device management policies that restrict connections to untrusted or unknown base stations, where feasible. 4) Collaborate with mobile network operators to enhance network security and share threat intelligence regarding rogue base station activity. 5) For critical deployments, consider using multi-factor connectivity solutions that combine cellular with other communication channels to maintain availability during attacks. 6) Conduct regular security assessments and penetration testing focused on cellular network vulnerabilities. 7) Educate staff about the risks of rogue base stations and encourage reporting of unusual connectivity issues. These targeted measures go beyond generic patching and help reduce the attack surface and impact of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f0b
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/2/2025, 3:26:55 AM
Last updated: 12/4/2025, 6:39:54 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumNation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.