CVE-2025-20761: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MediaTek chipset
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01311265; Issue ID: MSV-4655.
AI Analysis
Technical Summary
CVE-2025-20761 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting a broad range of MediaTek chipsets, including models from MT2735 through MT8893 series. The flaw exists in the modem firmware where error conditions are not correctly handled, leading to a potential system crash. An attacker can exploit this by setting up a rogue base station that a user equipment (UE) device connects to, triggering the improper error handling and causing a denial of service. The attack vector is remote over the cellular network, requiring no user interaction or elevated privileges, making it relatively easy to exploit in targeted scenarios. The vulnerability impacts availability by crashing the modem subsystem, disrupting cellular connectivity and device functionality. MediaTek has assigned Patch ID MOLY01311265 and Issue ID MSV-4655 to address this issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting the attack complexity as low, no privileges required, no user interaction, and impact limited to availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects a wide range of MediaTek chipsets commonly used in smartphones, IoT devices, and other cellular-enabled hardware.
Potential Impact
The primary impact of CVE-2025-20761 is a remote denial of service condition that can disrupt cellular connectivity by crashing the modem subsystem. This can lead to loss of voice, data, and emergency services on affected devices, potentially causing significant operational disruption for individuals and organizations relying on cellular communications. Critical infrastructure, emergency responders, and enterprises using cellular IoT devices could experience outages or degraded service. While the vulnerability does not allow data theft or device takeover, the loss of availability can have serious consequences, especially in environments where cellular connectivity is essential. The ease of exploitation via a rogue base station and lack of required user interaction increase the risk in hostile environments or targeted attacks. The broad range of affected chipsets means many devices globally could be vulnerable, amplifying the potential scale of impact.
Mitigation Recommendations
Organizations and device manufacturers should prioritize applying the official patch (MOLY01311265) provided by MediaTek as soon as it becomes available. Network operators and security teams should monitor for rogue base stations and employ detection mechanisms such as IMSI catchers or anomaly detection systems to identify suspicious cellular infrastructure. Device firmware and baseband updates should be deployed promptly to end users through secure update channels. For critical deployments, consider implementing network access controls or cellular network whitelisting to reduce exposure to untrusted base stations. Additionally, educating users about the risks of connecting to unknown cellular networks can help mitigate exploitation. Vendors should also review and improve error handling in modem firmware to prevent similar issues in future chipset designs.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, France, Brazil, Russia, Indonesia, Vietnam, Mexico, Italy, Turkey
CVE-2025-20761: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MediaTek chipset
Description
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01311265; Issue ID: MSV-4655.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20761 is a vulnerability classified under CWE-754 (Improper Check for Unusual or Exceptional Conditions) affecting a broad range of MediaTek chipsets, including models from MT2735 through MT8893 series. The flaw exists in the modem firmware where error conditions are not correctly handled, leading to a potential system crash. An attacker can exploit this by setting up a rogue base station that a user equipment (UE) device connects to, triggering the improper error handling and causing a denial of service. The attack vector is remote over the cellular network, requiring no user interaction or elevated privileges, making it relatively easy to exploit in targeted scenarios. The vulnerability impacts availability by crashing the modem subsystem, disrupting cellular connectivity and device functionality. MediaTek has assigned Patch ID MOLY01311265 and Issue ID MSV-4655 to address this issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting the attack complexity as low, no privileges required, no user interaction, and impact limited to availability. No known exploits have been reported in the wild as of the publication date. The vulnerability affects a wide range of MediaTek chipsets commonly used in smartphones, IoT devices, and other cellular-enabled hardware.
Potential Impact
The primary impact of CVE-2025-20761 is a remote denial of service condition that can disrupt cellular connectivity by crashing the modem subsystem. This can lead to loss of voice, data, and emergency services on affected devices, potentially causing significant operational disruption for individuals and organizations relying on cellular communications. Critical infrastructure, emergency responders, and enterprises using cellular IoT devices could experience outages or degraded service. While the vulnerability does not allow data theft or device takeover, the loss of availability can have serious consequences, especially in environments where cellular connectivity is essential. The ease of exploitation via a rogue base station and lack of required user interaction increase the risk in hostile environments or targeted attacks. The broad range of affected chipsets means many devices globally could be vulnerable, amplifying the potential scale of impact.
Mitigation Recommendations
Organizations and device manufacturers should prioritize applying the official patch (MOLY01311265) provided by MediaTek as soon as it becomes available. Network operators and security teams should monitor for rogue base stations and employ detection mechanisms such as IMSI catchers or anomaly detection systems to identify suspicious cellular infrastructure. Device firmware and baseband updates should be deployed promptly to end users through secure update channels. For critical deployments, consider implementing network access controls or cellular network whitelisting to reduce exposure to untrusted base stations. Additionally, educating users about the risks of connecting to unknown cellular networks can help mitigate exploitation. Vendors should also review and improve error handling in modem firmware to prevent similar issues in future chipset designs.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.398Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695c6e793839e44175bdd392
Added to database: 1/6/2026, 2:07:53 AM
Last enriched: 3/30/2026, 7:18:03 PM
Last updated: 5/10/2026, 9:35:30 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.