CVE-2025-20760: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible read of uninitialized heap data due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01676750; Issue ID: MSV-4653.
AI Analysis
Technical Summary
CVE-2025-20760 is a security vulnerability identified in a broad range of MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem firmware versions NR15, NR16, and NR17. The root cause is a reachable assertion triggered by the modem attempting to read uninitialized heap memory following an uncaught exception. This flaw can be exploited remotely by an attacker who controls a rogue cellular base station to which a user equipment (UE) device connects. The exploitation does not require any user interaction or elevated privileges, making it particularly dangerous. When triggered, the modem firmware may crash or enter an unstable state, resulting in a denial of service (DoS) condition that disrupts cellular connectivity. The vulnerability falls under CWE-617 (Reachable Assertion), indicating that the assertion failure can be reached during normal execution flow under attacker-controlled conditions. Although no public exploits have been reported yet, the vulnerability's nature suggests that attackers could feasibly deploy rogue base stations to target vulnerable devices. The issue was reserved in November 2024 and published in January 2026, with MediaTek assigning Patch ID MOLY01676750 and Issue ID MSV-4653. No CVSS score has been assigned, but the vulnerability's characteristics imply a significant risk to device availability and network reliability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20760 is the potential disruption of cellular communications due to modem crashes induced by rogue base stations. This can affect mobile devices, IoT endpoints, and critical infrastructure components relying on cellular connectivity. Telecommunications providers may experience increased customer complaints and service instability, while enterprises dependent on mobile networks for operational continuity could face interruptions. The vulnerability could be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity, leading to denial of service without detection. Additionally, critical sectors such as emergency services, transportation, and industrial control systems that use MediaTek-based cellular modules may suffer operational degradation. The lack of required user interaction and privileges lowers the barrier for attackers, increasing the risk of widespread impact. Although no known exploits exist currently, the potential for disruption in a highly connected European environment is significant.
Mitigation Recommendations
Mitigation should focus on a multi-layered approach. First, device manufacturers and vendors must prioritize releasing firmware updates that address the reachable assertion by properly initializing heap data and handling exceptions safely. European organizations should ensure timely deployment of these patches across all affected devices. Network operators can implement detection and mitigation mechanisms for rogue base stations, such as enhanced base station authentication protocols and anomaly detection systems that monitor unusual signaling patterns. Enterprises should consider deploying mobile threat defense solutions capable of identifying suspicious cellular network behavior. Additionally, organizations should maintain an inventory of devices using MediaTek chipsets and assess their exposure. For critical infrastructure, fallback communication channels and redundancy plans should be established to maintain operations during potential cellular outages. User education is less relevant here due to no user interaction requirement, but awareness among IT and security teams about this threat is essential for rapid response.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Poland
CVE-2025-20760: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible read of uninitialized heap data due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01676750; Issue ID: MSV-4653.
AI-Powered Analysis
Technical Analysis
CVE-2025-20760 is a security vulnerability identified in a broad range of MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem firmware versions NR15, NR16, and NR17. The root cause is a reachable assertion triggered by the modem attempting to read uninitialized heap memory following an uncaught exception. This flaw can be exploited remotely by an attacker who controls a rogue cellular base station to which a user equipment (UE) device connects. The exploitation does not require any user interaction or elevated privileges, making it particularly dangerous. When triggered, the modem firmware may crash or enter an unstable state, resulting in a denial of service (DoS) condition that disrupts cellular connectivity. The vulnerability falls under CWE-617 (Reachable Assertion), indicating that the assertion failure can be reached during normal execution flow under attacker-controlled conditions. Although no public exploits have been reported yet, the vulnerability's nature suggests that attackers could feasibly deploy rogue base stations to target vulnerable devices. The issue was reserved in November 2024 and published in January 2026, with MediaTek assigning Patch ID MOLY01676750 and Issue ID MSV-4653. No CVSS score has been assigned, but the vulnerability's characteristics imply a significant risk to device availability and network reliability.
Potential Impact
For European organizations, the primary impact of CVE-2025-20760 is the potential disruption of cellular communications due to modem crashes induced by rogue base stations. This can affect mobile devices, IoT endpoints, and critical infrastructure components relying on cellular connectivity. Telecommunications providers may experience increased customer complaints and service instability, while enterprises dependent on mobile networks for operational continuity could face interruptions. The vulnerability could be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity, leading to denial of service without detection. Additionally, critical sectors such as emergency services, transportation, and industrial control systems that use MediaTek-based cellular modules may suffer operational degradation. The lack of required user interaction and privileges lowers the barrier for attackers, increasing the risk of widespread impact. Although no known exploits exist currently, the potential for disruption in a highly connected European environment is significant.
Mitigation Recommendations
Mitigation should focus on a multi-layered approach. First, device manufacturers and vendors must prioritize releasing firmware updates that address the reachable assertion by properly initializing heap data and handling exceptions safely. European organizations should ensure timely deployment of these patches across all affected devices. Network operators can implement detection and mitigation mechanisms for rogue base stations, such as enhanced base station authentication protocols and anomaly detection systems that monitor unusual signaling patterns. Enterprises should consider deploying mobile threat defense solutions capable of identifying suspicious cellular network behavior. Additionally, organizations should maintain an inventory of devices using MediaTek chipsets and assess their exposure. For critical infrastructure, fallback communication channels and redundancy plans should be established to maintain operations during potential cellular outages. User education is less relevant here due to no user interaction requirement, but awareness among IT and security teams about this threat is essential for rapid response.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.398Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695c6e793839e44175bdd38f
Added to database: 1/6/2026, 2:07:53 AM
Last enriched: 1/6/2026, 2:38:42 AM
Last updated: 1/8/2026, 10:18:32 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21871: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.