CVE-2025-20757: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673751; Issue ID: MSV-4644.
AI Analysis
Technical Summary
CVE-2025-20757 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of numerous MediaTek chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, and others. The flaw arises from improper input validation within the modem's handling of signals when a user equipment (UE) connects to a base station. An attacker controlling a rogue base station can send crafted inputs that trigger an assertion failure, causing the modem system to crash, resulting in a denial of service (DoS). The vulnerability does not require user interaction and does not grant the attacker additional execution privileges beyond causing the crash. The attack vector is network-based, with a high attack complexity, and requires low privileges (the attacker must control a rogue base station). The modem version affected is NR15. The impact is limited to availability, with no confidentiality or integrity compromise reported. Although no known exploits have been observed in the wild, the vulnerability poses a risk to mobile devices using these chipsets, potentially disrupting cellular connectivity and services. MediaTek has assigned a patch ID (MOLY01673751) and issue ID (MSV-4644), indicating a fix is available or forthcoming. The vulnerability was reserved in November 2024 and published in December 2025, reflecting a recent discovery and disclosure timeline.
Potential Impact
For European organizations, this vulnerability could disrupt mobile communications by causing device modems to crash when connecting to rogue base stations. This can impact availability of cellular services, which is critical for enterprises relying on mobile connectivity for operations, remote work, IoT deployments, and emergency communications. Telecommunications providers and infrastructure operators may face increased risk of service degradation or outages if attackers deploy rogue base stations targeting vulnerable devices. Critical sectors such as finance, healthcare, transportation, and government services that depend on uninterrupted mobile connectivity could experience operational interruptions. The risk is heightened in environments where mobile devices with affected MediaTek chipsets are prevalent. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service can lead to loss of communication, impacting business continuity and safety-critical applications. The lack of user interaction requirement and remote exploitation capability increase the threat surface. However, the high attack complexity and need for a rogue base station limit the ease of exploitation to well-resourced attackers.
Mitigation Recommendations
European organizations should prioritize deploying the vendor-provided patches (MOLY01673751) as soon as they become available to remediate the vulnerability in affected modem firmware. Network operators and enterprises should implement detection and mitigation strategies against rogue base stations, such as using radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Mobile device management (MDM) solutions can be used to enforce firmware updates and monitor device health. Organizations should educate users and IT staff about the risks of connecting to untrusted cellular networks and encourage the use of trusted network providers. For critical infrastructure, deploying multi-factor communication channels and fallback connectivity options can reduce reliance on vulnerable modems. Collaboration with telecom providers to share threat intelligence and coordinate responses to rogue base station threats is recommended. Regular security assessments and penetration testing focusing on cellular network security can help identify exposure. Finally, maintaining up-to-date inventories of devices with affected chipsets will aid in targeted remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-20757: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673751; Issue ID: MSV-4644.
AI-Powered Analysis
Technical Analysis
CVE-2025-20757 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of numerous MediaTek chipsets including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, and others. The flaw arises from improper input validation within the modem's handling of signals when a user equipment (UE) connects to a base station. An attacker controlling a rogue base station can send crafted inputs that trigger an assertion failure, causing the modem system to crash, resulting in a denial of service (DoS). The vulnerability does not require user interaction and does not grant the attacker additional execution privileges beyond causing the crash. The attack vector is network-based, with a high attack complexity, and requires low privileges (the attacker must control a rogue base station). The modem version affected is NR15. The impact is limited to availability, with no confidentiality or integrity compromise reported. Although no known exploits have been observed in the wild, the vulnerability poses a risk to mobile devices using these chipsets, potentially disrupting cellular connectivity and services. MediaTek has assigned a patch ID (MOLY01673751) and issue ID (MSV-4644), indicating a fix is available or forthcoming. The vulnerability was reserved in November 2024 and published in December 2025, reflecting a recent discovery and disclosure timeline.
Potential Impact
For European organizations, this vulnerability could disrupt mobile communications by causing device modems to crash when connecting to rogue base stations. This can impact availability of cellular services, which is critical for enterprises relying on mobile connectivity for operations, remote work, IoT deployments, and emergency communications. Telecommunications providers and infrastructure operators may face increased risk of service degradation or outages if attackers deploy rogue base stations targeting vulnerable devices. Critical sectors such as finance, healthcare, transportation, and government services that depend on uninterrupted mobile connectivity could experience operational interruptions. The risk is heightened in environments where mobile devices with affected MediaTek chipsets are prevalent. Although the vulnerability does not compromise data confidentiality or integrity, the denial of service can lead to loss of communication, impacting business continuity and safety-critical applications. The lack of user interaction requirement and remote exploitation capability increase the threat surface. However, the high attack complexity and need for a rogue base station limit the ease of exploitation to well-resourced attackers.
Mitigation Recommendations
European organizations should prioritize deploying the vendor-provided patches (MOLY01673751) as soon as they become available to remediate the vulnerability in affected modem firmware. Network operators and enterprises should implement detection and mitigation strategies against rogue base stations, such as using radio frequency monitoring tools and anomaly detection systems to identify unauthorized base stations. Mobile device management (MDM) solutions can be used to enforce firmware updates and monitor device health. Organizations should educate users and IT staff about the risks of connecting to untrusted cellular networks and encourage the use of trusted network providers. For critical infrastructure, deploying multi-factor communication channels and fallback connectivity options can reduce reliance on vulnerable modems. Collaboration with telecom providers to share threat intelligence and coordinate responses to rogue base station threats is recommended. Regular security assessments and penetration testing focusing on cellular network security can help identify exposure. Finally, maintaining up-to-date inventories of devices with affected chipsets will aid in targeted remediation efforts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f0b
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/9/2025, 4:40:15 AM
Last updated: 1/19/2026, 9:48:22 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
Medium19th January – Threat Intelligence Report
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-59355: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Linkis
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.