CVE-2025-20758: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.
AI Analysis
Technical Summary
CVE-2025-20758 is a vulnerability in the modem firmware of a broad range of MediaTek chipsets (including MT2735, MT2737, MT6813, MT6833 series, MT6853 series, MT6873 series, MT6890 series, MT6980 series, MT8673 series, MT8755, MT8771, MT8791 series, MT8863, MT8883, and others). The root cause is an uncaught exception within the modem software, classified under CWE-248 (Uncaught Exception). When a user equipment (UE) device equipped with these modems connects to a maliciously controlled rogue base station, the attacker can trigger this exception, causing the modem to crash and resulting in a denial of service condition. This crash disrupts the device’s communication capabilities, effectively causing a remote DoS without requiring any user interaction or elevated privileges. The affected modem versions include NR15, NR16, NR17, and NR17R. The vulnerability was published on December 2, 2025, with a CVSS v3.1 base score of 4.9, indicating medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) within the modem context, and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. MediaTek has issued a patch (MOLY01673755) to address this issue. No known exploits have been reported in the wild, but the vulnerability poses a risk to devices in environments where rogue base stations could be deployed, such as targeted attacks or surveillance scenarios.
Potential Impact
For European organizations, the primary impact of CVE-2025-20758 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, impacting business operations reliant on mobile connectivity, including remote work, IoT deployments, and critical communications infrastructure. Telecommunications providers may face service degradation or outages if rogue base stations are used in targeted attacks. The vulnerability does not compromise data confidentiality or integrity, but availability loss can affect operational continuity, emergency services, and user productivity. Organizations in sectors such as finance, healthcare, transportation, and government, which depend on reliable mobile networks, could experience operational disruptions. Additionally, the proliferation of MediaTek chipsets in consumer and industrial devices across Europe increases the attack surface. The risk is heightened in environments where attackers can deploy rogue base stations, such as urban centers or border regions with geopolitical tensions. Although no exploits are currently known, the ease of triggering the vulnerability without user interaction warrants proactive mitigation to prevent service interruptions.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Ensure all devices using affected MediaTek modems are updated with the latest firmware patch MOLY01673755 or equivalent vendor updates as soon as they become available. 2) Network operators should monitor for and detect rogue base stations using radio frequency monitoring tools and anomaly detection systems to prevent unauthorized network access points. 3) Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4) Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, even though user interaction is not required for exploitation, awareness can aid in incident response. 5) Collaborate with telecom providers to implement network-level protections such as base station authentication and enhanced signaling security to reduce rogue base station risks. 6) For critical infrastructure, consider deploying fallback communication channels and redundancy to maintain availability during potential DoS events. 7) Conduct regular security assessments and penetration testing focusing on cellular network vulnerabilities to identify and remediate exposure points. These steps go beyond generic patching by incorporating detection, prevention, and resilience measures tailored to the threat vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20758: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.
AI-Powered Analysis
Technical Analysis
CVE-2025-20758 is a vulnerability in the modem firmware of a broad range of MediaTek chipsets (including MT2735, MT2737, MT6813, MT6833 series, MT6853 series, MT6873 series, MT6890 series, MT6980 series, MT8673 series, MT8755, MT8771, MT8791 series, MT8863, MT8883, and others). The root cause is an uncaught exception within the modem software, classified under CWE-248 (Uncaught Exception). When a user equipment (UE) device equipped with these modems connects to a maliciously controlled rogue base station, the attacker can trigger this exception, causing the modem to crash and resulting in a denial of service condition. This crash disrupts the device’s communication capabilities, effectively causing a remote DoS without requiring any user interaction or elevated privileges. The affected modem versions include NR15, NR16, NR17, and NR17R. The vulnerability was published on December 2, 2025, with a CVSS v3.1 base score of 4.9, indicating medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H) within the modem context, and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity loss. MediaTek has issued a patch (MOLY01673755) to address this issue. No known exploits have been reported in the wild, but the vulnerability poses a risk to devices in environments where rogue base stations could be deployed, such as targeted attacks or surveillance scenarios.
Potential Impact
For European organizations, the primary impact of CVE-2025-20758 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, impacting business operations reliant on mobile connectivity, including remote work, IoT deployments, and critical communications infrastructure. Telecommunications providers may face service degradation or outages if rogue base stations are used in targeted attacks. The vulnerability does not compromise data confidentiality or integrity, but availability loss can affect operational continuity, emergency services, and user productivity. Organizations in sectors such as finance, healthcare, transportation, and government, which depend on reliable mobile networks, could experience operational disruptions. Additionally, the proliferation of MediaTek chipsets in consumer and industrial devices across Europe increases the attack surface. The risk is heightened in environments where attackers can deploy rogue base stations, such as urban centers or border regions with geopolitical tensions. Although no exploits are currently known, the ease of triggering the vulnerability without user interaction warrants proactive mitigation to prevent service interruptions.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Ensure all devices using affected MediaTek modems are updated with the latest firmware patch MOLY01673755 or equivalent vendor updates as soon as they become available. 2) Network operators should monitor for and detect rogue base stations using radio frequency monitoring tools and anomaly detection systems to prevent unauthorized network access points. 3) Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4) Educate users and administrators about the risks of connecting to unknown or suspicious cellular networks, even though user interaction is not required for exploitation, awareness can aid in incident response. 5) Collaborate with telecom providers to implement network-level protections such as base station authentication and enhanced signaling security to reduce rogue base station risks. 6) For critical infrastructure, consider deploying fallback communication channels and redundancy to maintain availability during potential DoS events. 7) Conduct regular security assessments and penetration testing focusing on cellular network vulnerabilities to identify and remediate exposure points. These steps go beyond generic patching by incorporating detection, prevention, and resilience measures tailored to the threat vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f0e
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/9/2025, 4:40:35 AM
Last updated: 1/18/2026, 7:21:30 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1059: SQL Injection in FeMiner wms
MediumCVE-2026-1108: Buffer Overflow in cijliu librtsp
MediumCVE-2025-15534: Integer Overflow in raysan5 raylib
MediumCVE-2026-1112: Improper Authorization in Sanluan PublicCMS
MediumCVE-2026-1111: Path Traversal in Sanluan PublicCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.