CVE-2025-20759: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.
AI Analysis
Technical Summary
CVE-2025-20759 is a security vulnerability classified under CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735, MT2737, MT6833, MT6853, MT6873, MT6880, MT6980, MT8673, MT8791, MT8893, among others. The vulnerability stems from a missing bounds check in the modem firmware, which allows an attacker controlling a rogue base station to trigger an out-of-bounds read condition remotely. This flaw can cause the modem to read memory outside the intended buffer boundaries, potentially leading to a denial of service (DoS) by crashing or destabilizing the modem firmware. Exploitation does not require any user interaction or elevated privileges on the device, making it a remotely exploitable vulnerability with a wide attack surface. The affected modem versions are NR15 and NR16, which are commonly integrated into mobile devices and IoT equipment. While no exploits have been reported in the wild, the vulnerability poses a significant risk due to the critical role of modems in maintaining cellular connectivity. The issue was reserved in November 2024 and published in December 2025, with MediaTek assigning it the internal issue ID MSV-4650 and patch ID MOLY01673760. The lack of a CVSS score requires an independent severity assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2025-20759 is the potential disruption of cellular connectivity due to modem crashes or instability caused by the out-of-bounds read. This can affect mobile devices, IoT endpoints, and critical infrastructure relying on cellular communications, such as smart grids, transportation systems, and emergency services. Remote denial of service could lead to loss of availability, impacting business operations, communications, and safety systems. Since exploitation requires only a rogue base station, attackers could target specific geographic areas or organizations by deploying malicious base stations near critical facilities or densely populated urban centers. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the risk of large-scale service interruptions. Confidentiality and integrity impacts are limited, as the vulnerability does not grant code execution or data manipulation capabilities. However, the availability impact alone can have severe operational consequences, especially in sectors dependent on continuous mobile connectivity.
Mitigation Recommendations
European organizations should prioritize obtaining and deploying the official MediaTek patch identified as MOLY01673760 for affected modem versions NR15 and NR16. Network operators and device manufacturers should coordinate firmware updates to ensure timely remediation. Additionally, organizations should implement network monitoring to detect and block rogue base stations using radio frequency scanning tools and anomaly detection systems. Employing SIM-based network authentication enhancements and base station validation mechanisms can reduce exposure to malicious base stations. For critical infrastructure, deploying redundant communication channels and failover mechanisms can mitigate the impact of potential denial of service events. Security teams should also educate users and administrators about the risks of connecting to untrusted cellular networks and encourage the use of VPNs or encrypted communication where possible. Finally, maintaining an inventory of devices with affected MediaTek chipsets will help prioritize patching and risk management efforts.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2025-20759: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
Description
In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.
AI-Powered Analysis
Technical Analysis
CVE-2025-20759 is a security vulnerability classified under CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735, MT2737, MT6833, MT6853, MT6873, MT6880, MT6980, MT8673, MT8791, MT8893, among others. The vulnerability stems from a missing bounds check in the modem firmware, which allows an attacker controlling a rogue base station to trigger an out-of-bounds read condition remotely. This flaw can cause the modem to read memory outside the intended buffer boundaries, potentially leading to a denial of service (DoS) by crashing or destabilizing the modem firmware. Exploitation does not require any user interaction or elevated privileges on the device, making it a remotely exploitable vulnerability with a wide attack surface. The affected modem versions are NR15 and NR16, which are commonly integrated into mobile devices and IoT equipment. While no exploits have been reported in the wild, the vulnerability poses a significant risk due to the critical role of modems in maintaining cellular connectivity. The issue was reserved in November 2024 and published in December 2025, with MediaTek assigning it the internal issue ID MSV-4650 and patch ID MOLY01673760. The lack of a CVSS score requires an independent severity assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2025-20759 is the potential disruption of cellular connectivity due to modem crashes or instability caused by the out-of-bounds read. This can affect mobile devices, IoT endpoints, and critical infrastructure relying on cellular communications, such as smart grids, transportation systems, and emergency services. Remote denial of service could lead to loss of availability, impacting business operations, communications, and safety systems. Since exploitation requires only a rogue base station, attackers could target specific geographic areas or organizations by deploying malicious base stations near critical facilities or densely populated urban centers. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the risk of large-scale service interruptions. Confidentiality and integrity impacts are limited, as the vulnerability does not grant code execution or data manipulation capabilities. However, the availability impact alone can have severe operational consequences, especially in sectors dependent on continuous mobile connectivity.
Mitigation Recommendations
European organizations should prioritize obtaining and deploying the official MediaTek patch identified as MOLY01673760 for affected modem versions NR15 and NR16. Network operators and device manufacturers should coordinate firmware updates to ensure timely remediation. Additionally, organizations should implement network monitoring to detect and block rogue base stations using radio frequency scanning tools and anomaly detection systems. Employing SIM-based network authentication enhancements and base station validation mechanisms can reduce exposure to malicious base stations. For critical infrastructure, deploying redundant communication channels and failover mechanisms can mitigate the impact of potential denial of service events. Security teams should also educate users and administrators about the risks of connecting to untrusted cellular networks and encourage the use of VPNs or encrypted communication where possible. Finally, maintaining an inventory of devices with affected MediaTek chipsets will help prioritize patching and risk management efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f11
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/2/2025, 3:26:28 AM
Last updated: 12/3/2025, 11:58:37 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.