CVE-2025-20758: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.
AI Analysis
Technical Summary
CVE-2025-20758 identifies a vulnerability in the modem firmware of a broad range of MediaTek chipsets (including MT2735 through MT8893 series) used in mobile devices. The root cause is an uncaught exception (CWE-248) within the modem's NR (New Radio) protocol stack versions NR15, NR16, NR17, and NR17R. When a user equipment (UE) connects to a maliciously controlled rogue base station, the modem encounters an exception it cannot handle, resulting in a system crash. This crash leads to a remote denial of service (DoS) condition, effectively disrupting the device’s cellular connectivity. Exploitation does not require any additional execution privileges or user interaction, making it a low-barrier attack vector. The vulnerability affects the modem’s availability and potentially impacts the device's ability to maintain network connectivity. The issue was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No public exploits have been reported, but the broad range of affected chipsets and the nature of the attack vector make it a significant concern. The vulnerability is particularly relevant for devices relying on MediaTek modems in mobile networks, including smartphones, IoT devices, and embedded systems. The patch identifier MOLY01673755 and issue ID MSV-4647 indicate that MediaTek has developed a fix, though patch deployment depends on device manufacturers and carriers.
Potential Impact
For European organizations, this vulnerability could disrupt mobile communications by causing devices to crash when connecting to rogue base stations. This can impact critical sectors relying on mobile connectivity such as emergency services, transportation, healthcare, and industrial IoT. The denial of service could degrade operational continuity and user productivity. Since exploitation requires no user interaction or privileges, attackers could target large numbers of devices remotely, potentially causing widespread outages. The risk is amplified in environments with high reliance on cellular networks for primary or backup communications. Additionally, rogue base stations could be deployed by malicious actors or nation-state adversaries to disrupt communications or conduct surveillance. The impact extends to mobile network operators who may face increased support costs and reputational damage. European enterprises with mobile device fleets using MediaTek chipsets are at risk of service interruptions, affecting business continuity and security monitoring capabilities.
Mitigation Recommendations
Organizations should prioritize obtaining and deploying the vendor-supplied patches (MOLY01673755) as soon as they become available from device manufacturers or carriers. Network operators should implement detection and prevention mechanisms for rogue base stations, including monitoring for anomalous base station identifiers and signal characteristics. Employing mobile threat defense solutions that can detect suspicious network behavior is recommended. Enterprises should enforce strict device management policies to ensure devices are updated promptly and restrict connections to untrusted networks. Where possible, use multi-factor authentication and VPNs to secure communications, mitigating the impact of potential network-level attacks. Security teams should monitor threat intelligence feeds for any emerging exploits and prepare incident response plans for potential denial of service scenarios. Collaboration with telecom providers to enhance network security and rapid incident response is advised. Finally, educating users about the risks of connecting to unknown networks can reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20758: CWE-248 Uncaught Exception in MediaTek, Inc. MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673755; Issue ID: MSV-4647.
AI-Powered Analysis
Technical Analysis
CVE-2025-20758 identifies a vulnerability in the modem firmware of a broad range of MediaTek chipsets (including MT2735 through MT8893 series) used in mobile devices. The root cause is an uncaught exception (CWE-248) within the modem's NR (New Radio) protocol stack versions NR15, NR16, NR17, and NR17R. When a user equipment (UE) connects to a maliciously controlled rogue base station, the modem encounters an exception it cannot handle, resulting in a system crash. This crash leads to a remote denial of service (DoS) condition, effectively disrupting the device’s cellular connectivity. Exploitation does not require any additional execution privileges or user interaction, making it a low-barrier attack vector. The vulnerability affects the modem’s availability and potentially impacts the device's ability to maintain network connectivity. The issue was reserved in November 2024 and published in December 2025, with no CVSS score assigned yet. No public exploits have been reported, but the broad range of affected chipsets and the nature of the attack vector make it a significant concern. The vulnerability is particularly relevant for devices relying on MediaTek modems in mobile networks, including smartphones, IoT devices, and embedded systems. The patch identifier MOLY01673755 and issue ID MSV-4647 indicate that MediaTek has developed a fix, though patch deployment depends on device manufacturers and carriers.
Potential Impact
For European organizations, this vulnerability could disrupt mobile communications by causing devices to crash when connecting to rogue base stations. This can impact critical sectors relying on mobile connectivity such as emergency services, transportation, healthcare, and industrial IoT. The denial of service could degrade operational continuity and user productivity. Since exploitation requires no user interaction or privileges, attackers could target large numbers of devices remotely, potentially causing widespread outages. The risk is amplified in environments with high reliance on cellular networks for primary or backup communications. Additionally, rogue base stations could be deployed by malicious actors or nation-state adversaries to disrupt communications or conduct surveillance. The impact extends to mobile network operators who may face increased support costs and reputational damage. European enterprises with mobile device fleets using MediaTek chipsets are at risk of service interruptions, affecting business continuity and security monitoring capabilities.
Mitigation Recommendations
Organizations should prioritize obtaining and deploying the vendor-supplied patches (MOLY01673755) as soon as they become available from device manufacturers or carriers. Network operators should implement detection and prevention mechanisms for rogue base stations, including monitoring for anomalous base station identifiers and signal characteristics. Employing mobile threat defense solutions that can detect suspicious network behavior is recommended. Enterprises should enforce strict device management policies to ensure devices are updated promptly and restrict connections to untrusted networks. Where possible, use multi-factor authentication and VPNs to secure communications, mitigating the impact of potential network-level attacks. Security teams should monitor threat intelligence feeds for any emerging exploits and prepare incident response plans for potential denial of service scenarios. Collaboration with telecom providers to enhance network security and rapid incident response is advised. Finally, educating users about the risks of connecting to unknown networks can reduce exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f0e
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/2/2025, 3:26:40 AM
Last updated: 12/4/2025, 5:45:59 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighCVE-2025-11379: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in roselldk WebP Express
MediumHow I Reverse Engineered a Billion-Dollar Legal AI Tool and Found 100k+ Confidential Files
MediumNation-State Attack or Compromised Government? [Guest Diary], (Thu, Dec 4th)
MediumCVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.