Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20759: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

0
Medium
VulnerabilityCVE-2025-20759cvecve-2025-20759cwe-125
Published: Tue Dec 02 2025 (12/02/2025, 02:34:11 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

Description

In Modem, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01673760; Issue ID: MSV-4650.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:26:28 UTC

Technical Analysis

CVE-2025-20759 is a security vulnerability classified under CWE-125 (Out-of-bounds Read) affecting a broad range of MediaTek modem chipsets, including models MT2735, MT2737, MT6833, MT6853, MT6873, MT6880, MT6980, MT8673, MT8791, MT8893, among others. The vulnerability stems from a missing bounds check in the modem firmware, which allows an attacker controlling a rogue base station to trigger an out-of-bounds read condition remotely. This flaw can cause the modem to read memory outside the intended buffer boundaries, potentially leading to a denial of service (DoS) by crashing or destabilizing the modem firmware. Exploitation does not require any user interaction or elevated privileges on the device, making it a remotely exploitable vulnerability with a wide attack surface. The affected modem versions are NR15 and NR16, which are commonly integrated into mobile devices and IoT equipment. While no exploits have been reported in the wild, the vulnerability poses a significant risk due to the critical role of modems in maintaining cellular connectivity. The issue was reserved in November 2024 and published in December 2025, with MediaTek assigning it the internal issue ID MSV-4650 and patch ID MOLY01673760. The lack of a CVSS score requires an independent severity assessment based on the technical details and potential impact.

Potential Impact

For European organizations, the primary impact of CVE-2025-20759 is the potential disruption of cellular connectivity due to modem crashes or instability caused by the out-of-bounds read. This can affect mobile devices, IoT endpoints, and critical infrastructure relying on cellular communications, such as smart grids, transportation systems, and emergency services. Remote denial of service could lead to loss of availability, impacting business operations, communications, and safety systems. Since exploitation requires only a rogue base station, attackers could target specific geographic areas or organizations by deploying malicious base stations near critical facilities or densely populated urban centers. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe increases the risk of large-scale service interruptions. Confidentiality and integrity impacts are limited, as the vulnerability does not grant code execution or data manipulation capabilities. However, the availability impact alone can have severe operational consequences, especially in sectors dependent on continuous mobile connectivity.

Mitigation Recommendations

European organizations should prioritize obtaining and deploying the official MediaTek patch identified as MOLY01673760 for affected modem versions NR15 and NR16. Network operators and device manufacturers should coordinate firmware updates to ensure timely remediation. Additionally, organizations should implement network monitoring to detect and block rogue base stations using radio frequency scanning tools and anomaly detection systems. Employing SIM-based network authentication enhancements and base station validation mechanisms can reduce exposure to malicious base stations. For critical infrastructure, deploying redundant communication channels and failover mechanisms can mitigate the impact of potential denial of service events. Security teams should also educate users and administrators about the risks of connecting to untrusted cellular networks and encourage the use of VPNs or encrypted communication where possible. Finally, maintaining an inventory of devices with affected MediaTek chipsets will help prioritize patching and risk management efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.397Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57aff2f793a7de7f5f11

Added to database: 12/2/2025, 3:06:23 AM

Last enriched: 12/2/2025, 3:26:28 AM

Last updated: 12/3/2025, 11:58:37 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats