Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20761: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT2735, MT2737, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2025-20761cvecve-2025-20761cwe-754
Published: Tue Jan 06 2026 (01/06/2026, 01:46:36 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01311265; Issue ID: MSV-4655.

AI-Powered Analysis

AILast updated: 01/06/2026, 02:38:29 UTC

Technical Analysis

CVE-2025-20761 is a vulnerability identified in a broad range of MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem versions NR15, NR16, and NR17. The root cause is an improper check for unusual or exceptional conditions (CWE-754) within the modem's error handling logic. Specifically, when a user equipment (UE) device connects to a rogue base station controlled by an attacker, the modem may incorrectly handle error conditions, leading to a system crash. This crash results in a denial of service (DoS) condition on the affected device. The vulnerability does not require any additional execution privileges or user interaction, making it remotely exploitable by an attacker capable of setting up or controlling a rogue base station. The flaw affects the modem firmware responsible for managing cellular connections, which is critical for maintaining network availability and device functionality. While no public exploits are currently known, the potential for disruption is significant due to the widespread deployment of these MediaTek chipsets in mobile devices globally. The vulnerability was reserved in November 2024 and published in January 2026, with a patch identified as MOLY01311265. However, no CVSS score has been assigned yet, and no exploit code has been publicly disclosed. The issue is particularly concerning for environments where mobile connectivity is essential, such as enterprise communications, emergency services, and IoT deployments relying on cellular networks.

Potential Impact

For European organizations, the primary impact of CVE-2025-20761 is the potential for remote denial of service attacks against devices using affected MediaTek modems. This can disrupt mobile communications, leading to loss of connectivity for employees, customers, or critical systems relying on cellular networks. Telecommunications providers could see network instability or increased support costs due to affected user devices. Enterprises using mobile broadband for remote sites or IoT devices may experience outages, impacting operational continuity. The vulnerability could also be exploited to target specific high-value individuals or organizations by deploying rogue base stations in proximity, causing targeted service disruption. Given the lack of required user interaction and no need for elevated privileges, the attack surface is broad, increasing the risk of widespread impact. Additionally, critical infrastructure sectors such as healthcare, transportation, and public safety that depend on reliable mobile communications may face operational risks. The economic and reputational damage from service outages could be significant, especially if exploited at scale or during critical events.

Mitigation Recommendations

To mitigate CVE-2025-20761, European organizations should prioritize the following actions: 1) Apply the official MediaTek patch MOLY01311265 as soon as it becomes available and validated by device manufacturers. 2) Coordinate with mobile device vendors and telecom providers to ensure firmware updates are deployed promptly across all affected devices. 3) Implement network monitoring solutions capable of detecting rogue base stations or unusual cellular network behavior, leveraging anomaly detection and threat intelligence feeds. 4) Employ mobile device management (MDM) solutions to enforce security policies and facilitate rapid patch deployment. 5) Educate users and IT staff about the risks of connecting to untrusted cellular networks, especially in high-risk environments. 6) For critical infrastructure, consider redundant communication channels to maintain connectivity if cellular networks are disrupted. 7) Collaborate with telecom operators to enhance base station authentication and validation mechanisms to reduce the feasibility of rogue base station attacks. 8) Regularly audit and update security configurations on mobile devices and network infrastructure to minimize exposure. These measures go beyond generic advice by focusing on coordinated patch management, network-level detection, and operational resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd392

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 1/6/2026, 2:38:29 AM

Last updated: 1/8/2026, 7:52:34 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats