Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20758: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2025-20758cvecve-2025-20758cwe-248
Published: Tue Dec 02 2025 (12/02/2025, 02:34:13 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:26:40 UTC

Technical Analysis

CVE-2025-20758 identifies a vulnerability in the modem firmware of a broad range of MediaTek chipsets (including MT2735 through MT8893 series) used in mobile devices. The root cause is an uncaught exception (CWE-248) within the modem's NR (New Radio) protocol stack versions NR15, NR16, NR17, and NR17R. When a user equipment (UE) connects to a maliciously controlled rogue base station, the modem encounters an exception it cannot handle, resulting in a system crash. This crash leads to a remote denial of service (DoS) condition, effectively disrupting the device’s cellular connectivity. Exploitation does not require any additional execution privileges or user interaction, making it a low-barrier attack vector. The vulnerability affects the modem’s availability and potentially impacts the device's ability to maintain network connectivity. The issue was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No public exploits have been reported, but the broad range of affected chipsets and the nature of the attack vector make it a significant concern. The vulnerability is particularly relevant for devices relying on MediaTek modems in mobile networks, including smartphones, IoT devices, and embedded systems. The patch identifier MOLY01673755 and issue ID MSV-4647 indicate that MediaTek has developed a fix, though patch deployment depends on device manufacturers and carriers.

Potential Impact

For European organizations, this vulnerability could disrupt mobile communications by causing devices to crash when connecting to rogue base stations. This can impact critical sectors relying on mobile connectivity such as emergency services, transportation, healthcare, and industrial IoT. The denial of service could degrade operational continuity and user productivity. Since exploitation requires no user interaction or privileges, attackers could target large numbers of devices remotely, potentially causing widespread outages. The risk is amplified in environments with high reliance on cellular networks for primary or backup communications. Additionally, rogue base stations could be deployed by malicious actors or nation-state adversaries to disrupt communications or conduct surveillance. The impact extends to mobile network operators who may face increased support costs and reputational damage. European enterprises with mobile device fleets using MediaTek chipsets are at risk of service interruptions, affecting business continuity and security monitoring capabilities.

Mitigation Recommendations

Organizations should prioritize obtaining and deploying the vendor-supplied patches (MOLY01673755) as soon as they become available from device manufacturers or carriers. Network operators should implement detection and prevention mechanisms for rogue base stations, including monitoring for anomalous base station identifiers and signal characteristics. Employing mobile threat defense solutions that can detect suspicious network behavior is recommended. Enterprises should enforce strict device management policies to ensure devices are updated promptly and restrict connections to untrusted networks. Where possible, use multi-factor authentication and VPNs to secure communications, mitigating the impact of potential network-level attacks. Security teams should monitor threat intelligence feeds for any emerging exploits and prepare incident response plans for potential denial of service scenarios. Collaboration with telecom providers to enhance network security and rapid incident response is advised. Finally, educating users about the risks of connecting to unknown networks can reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5f0e

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/2/2025, 3:26:40 AM

Last updated: 12/4/2025, 5:45:59 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats