CVE-2025-20759: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.
AI Analysis
Technical Summary
CVE-2025-20759 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a wide range of MediaTek modem chipsets, including MT2735, MT2737, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6980 series, MT8673 series, MT8771, MT8791 series, MT8795T, MT8797, MT8798, and MT8893. The flaw arises from a missing bounds check in the modem firmware, allowing an attacker controlling a rogue base station to induce an out-of-bounds read condition remotely. This can cause the modem to crash or become unresponsive, resulting in a denial of service (DoS) condition on the user equipment (UE). Exploitation does not require user interaction or elevated privileges, making it feasible to execute silently once the UE connects to the malicious base station. The affected modem versions are NR15 and NR16, which are commonly integrated into mobile devices, IoT gateways, and embedded systems. The vulnerability impacts availability only, with no direct compromise of confidentiality or integrity. Although no exploits have been reported in the wild, the broad chipset coverage and ease of triggering the flaw pose a tangible risk. The issue was publicly disclosed on December 2, 2025, with MediaTek assigning patch ID MOLY01673760 and issue ID MSV-4650. The CVSS v3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and high availability impact. This vulnerability underscores the importance of secure modem firmware development and the risks posed by rogue cellular infrastructure in the threat landscape.
Potential Impact
For European organizations, the primary impact of CVE-2025-20759 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt critical communications, especially in sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The vulnerability could be exploited by adversaries deploying rogue base stations to selectively target devices, causing service outages or degrading network reliability. This risk is heightened in environments with high reliance on cellular connectivity for operational continuity. Although the vulnerability does not expose sensitive data or allow code execution, the loss of availability can have cascading effects on business operations and safety-critical systems. European mobile network operators and device manufacturers integrating these chipsets may face increased support costs and reputational damage if devices become unstable or unusable. Furthermore, the presence of this flaw highlights supply chain risks associated with embedded components in telecommunications infrastructure and consumer devices. Prolonged exploitation could undermine trust in network services and complicate compliance with regulatory requirements for service availability and resilience.
Mitigation Recommendations
To mitigate CVE-2025-20759, European organizations should take a multi-layered approach: 1) Coordinate with device manufacturers and MediaTek to obtain and deploy firmware patches (MOLY01673760) for affected modem versions NR15 and NR16 as soon as they become available. 2) Implement network monitoring solutions capable of detecting anomalous base station behavior or unauthorized cellular infrastructure, including the use of IMSI catchers or rogue base stations. 3) Employ device-level protections such as baseband firewalls or modem firmware integrity checks where supported. 4) For critical deployments, consider using devices with alternative modem chipsets not affected by this vulnerability until patches are fully deployed. 5) Educate security teams about the risks of rogue base stations and incorporate detection of such threats into incident response plans. 6) Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within their networks. 7) Regularly audit and update device inventories to identify all assets using vulnerable MediaTek modems to prioritize patching efforts. 8) Engage with supply chain partners to ensure transparency and timely vulnerability disclosures for embedded components. These steps go beyond generic advice by focusing on infrastructure-level detection and supply chain risk management specific to modem vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20759: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
Description
In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.
AI-Powered Analysis
Technical Analysis
CVE-2025-20759 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting a wide range of MediaTek modem chipsets, including MT2735, MT2737, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6980 series, MT8673 series, MT8771, MT8791 series, MT8795T, MT8797, MT8798, and MT8893. The flaw arises from a missing bounds check in the modem firmware, allowing an attacker controlling a rogue base station to induce an out-of-bounds read condition remotely. This can cause the modem to crash or become unresponsive, resulting in a denial of service (DoS) condition on the user equipment (UE). Exploitation does not require user interaction or elevated privileges, making it feasible to execute silently once the UE connects to the malicious base station. The affected modem versions are NR15 and NR16, which are commonly integrated into mobile devices, IoT gateways, and embedded systems. The vulnerability impacts availability only, with no direct compromise of confidentiality or integrity. Although no exploits have been reported in the wild, the broad chipset coverage and ease of triggering the flaw pose a tangible risk. The issue was publicly disclosed on December 2, 2025, with MediaTek assigning patch ID MOLY01673760 and issue ID MSV-4650. The CVSS v3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, no confidentiality or integrity impact, and high availability impact. This vulnerability underscores the importance of secure modem firmware development and the risks posed by rogue cellular infrastructure in the threat landscape.
Potential Impact
For European organizations, the primary impact of CVE-2025-20759 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt critical communications, especially in sectors relying on mobile connectivity such as telecommunications providers, emergency services, transportation, and industrial IoT deployments. The vulnerability could be exploited by adversaries deploying rogue base stations to selectively target devices, causing service outages or degrading network reliability. This risk is heightened in environments with high reliance on cellular connectivity for operational continuity. Although the vulnerability does not expose sensitive data or allow code execution, the loss of availability can have cascading effects on business operations and safety-critical systems. European mobile network operators and device manufacturers integrating these chipsets may face increased support costs and reputational damage if devices become unstable or unusable. Furthermore, the presence of this flaw highlights supply chain risks associated with embedded components in telecommunications infrastructure and consumer devices. Prolonged exploitation could undermine trust in network services and complicate compliance with regulatory requirements for service availability and resilience.
Mitigation Recommendations
To mitigate CVE-2025-20759, European organizations should take a multi-layered approach: 1) Coordinate with device manufacturers and MediaTek to obtain and deploy firmware patches (MOLY01673760) for affected modem versions NR15 and NR16 as soon as they become available. 2) Implement network monitoring solutions capable of detecting anomalous base station behavior or unauthorized cellular infrastructure, including the use of IMSI catchers or rogue base stations. 3) Employ device-level protections such as baseband firewalls or modem firmware integrity checks where supported. 4) For critical deployments, consider using devices with alternative modem chipsets not affected by this vulnerability until patches are fully deployed. 5) Educate security teams about the risks of rogue base stations and incorporate detection of such threats into incident response plans. 6) Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within their networks. 7) Regularly audit and update device inventories to identify all assets using vulnerable MediaTek modems to prioritize patching efforts. 8) Engage with supply chain partners to ensure transparency and timely vulnerability disclosures for embedded components. These steps go beyond generic advice by focusing on infrastructure-level detection and supply chain risk management specific to modem vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.397Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57aff2f793a7de7f5f11
Added to database: 12/2/2025, 3:06:23 AM
Last enriched: 12/9/2025, 4:40:48 AM
Last updated: 1/18/2026, 8:07:58 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Wireshark 4.6.3 Released, (Sat, Jan 17th)
Medium"How many states are there in the United States?", (Sun, Jan 18th)
MediumTennessee Man Pleads Guilty to Repeatedly Hacking Supreme Court’s Filing System
MediumBlack Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
MediumCVE-2025-15535: NULL Pointer Dereference in nicbarker clay
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.