Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20762: CWE-617 Reachable Assertion in MediaTek, Inc. MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8755, MT8792, MT8793, MT8863, MT8873, MT8883

0
Medium
VulnerabilityCVE-2025-20762cvecve-2025-20762cwe-617
Published: Tue Jan 06 2026 (01/06/2026, 01:46:34 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8755, MT8792, MT8793, MT8863, MT8873, MT8883

Description

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01685181; Issue ID: MSV-4760.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:55:09 UTC

Technical Analysis

CVE-2025-20762 is a vulnerability identified in multiple MediaTek modem chipsets, including models MT6835, MT6878, MT6897, MT6991, MT8676, MT8755, MT8792, MT8863, MT8873, and MT8883. The issue stems from a reachable assertion failure (CWE-617) caused by incorrect error handling within the modem firmware, specifically in the NR17 modem version. When a user equipment (UE) device equipped with these chipsets connects to a rogue base station controlled by an attacker, the modem may encounter an assertion failure leading to a system crash. This results in a remote denial of service (DoS) condition. Notably, exploitation does not require any privileges or user interaction, making it easier for attackers to trigger the fault remotely. The vulnerability affects the availability of the device but does not impact confidentiality or integrity. The CVSS v3.1 score is 6.5 (medium), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H). Although no known exploits are currently reported in the wild, the presence of a patch (MOLY01685181) indicates that MediaTek has addressed the issue internally. This vulnerability is particularly relevant for mobile devices using these chipsets, including smartphones, IoT devices, and embedded systems that rely on cellular connectivity.

Potential Impact

For European organizations, the primary impact of CVE-2025-20762 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting business operations reliant on cellular networks, such as remote work, IoT deployments, and critical communications infrastructure. Industries like telecommunications, transportation, healthcare, and emergency services could experience service interruptions if devices lose connectivity or crash unexpectedly. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can degrade operational continuity and user experience. Additionally, the attack vector requires a rogue base station, which could be deployed in targeted attacks or in areas with weak network security controls. European organizations with extensive mobile device fleets or IoT ecosystems using these chipsets should be aware of the risk of service disruption and plan accordingly.

Mitigation Recommendations

To mitigate CVE-2025-20762, European organizations should: 1) Apply the official MediaTek patch (MOLY01685181) as soon as it becomes available from device manufacturers or vendors to fix the underlying firmware issue. 2) Monitor and restrict connections to unauthorized or suspicious base stations by implementing network access controls and using mobile network anomaly detection tools. 3) Employ mobile device management (MDM) solutions to ensure devices are updated promptly and to enforce security policies. 4) Educate users and administrators about the risks of rogue base stations and encourage reporting of unusual network behavior. 5) For critical infrastructure, consider deploying additional network segmentation and redundancy to minimize impact from device outages. 6) Collaborate with mobile network operators to identify and mitigate rogue base station threats within their coverage areas. 7) Continuously monitor device logs and network traffic for signs of repeated assertion failures or crashes that could indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd395

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 2/18/2026, 8:55:09 AM

Last updated: 3/24/2026, 1:35:27 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses