CVE-2025-20762: CWE-617 Reachable Assertion in MediaTek, Inc. MediaTek chipset
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01685181; Issue ID: MSV-4760.
AI Analysis
Technical Summary
CVE-2025-20762 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of various MediaTek chipsets, including models MT6835, MT6878, MT6897, MT6991, MT8676, MT8755, MT8792, MT8863, MT8873, and MT8883 among others. The flaw arises from improper error handling within the modem's software, which leads to a reachable assertion failure. When a user equipment (UE) device connects to a maliciously controlled rogue base station, the assertion triggers a system crash, resulting in a denial of service condition. Notably, exploitation does not require any privileges or user interaction, making it easier for attackers to cause disruption remotely. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting a medium severity due to the remote attack vector and lack of required privileges, balanced by the limited impact scope (availability only). MediaTek has assigned a patch ID (MOLY01685181) and issue ID (MSV-4760) for remediation, though no public patch link is currently available. No known exploits have been reported in the wild to date. This vulnerability primarily impacts devices using the affected MediaTek chipsets, which are widely deployed in smartphones and IoT devices globally.
Potential Impact
The primary impact of CVE-2025-20762 is a remote denial of service condition on devices using affected MediaTek chipsets. This can cause devices to crash or become unresponsive when connecting to a rogue base station, potentially disrupting communications and device availability. For organizations, this could lead to service interruptions, especially in environments relying on cellular connectivity for critical operations or IoT deployments. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this vulnerability, increasing the risk of widespread disruption in areas where rogue base stations can be deployed. However, the vulnerability does not allow data theft, modification, or privilege escalation, limiting its impact to availability. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are widely deployed. The impact is more significant in regions with high usage of affected MediaTek chipsets and where adversaries have the capability to deploy rogue base stations.
Mitigation Recommendations
1. Apply patches from MediaTek as soon as they become available to address the assertion failure in the modem firmware. 2. Network operators and organizations should deploy detection and mitigation systems to identify and block rogue base stations, such as using radio frequency monitoring tools and anomaly detection in cellular networks. 3. Device manufacturers should implement additional validation and error handling in modem firmware to prevent assertion failures. 4. Enterprises relying on cellular connectivity should consider multi-network redundancy or fallback mechanisms to maintain availability if one network is compromised. 5. Security teams should monitor threat intelligence feeds for any emerging exploits targeting this vulnerability. 6. End users should be advised to keep device firmware updated and avoid connecting to suspicious or unknown cellular networks. 7. Collaboration with mobile network operators to enhance base station authentication and integrity checks can reduce the risk of rogue base station attacks.
Affected Countries
China, India, United States, Taiwan, South Korea, Japan, Germany, Brazil, Russia, Indonesia, Vietnam, Thailand, Malaysia
CVE-2025-20762: CWE-617 Reachable Assertion in MediaTek, Inc. MediaTek chipset
Description
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01685181; Issue ID: MSV-4760.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-20762 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of various MediaTek chipsets, including models MT6835, MT6878, MT6897, MT6991, MT8676, MT8755, MT8792, MT8863, MT8873, and MT8883 among others. The flaw arises from improper error handling within the modem's software, which leads to a reachable assertion failure. When a user equipment (UE) device connects to a maliciously controlled rogue base station, the assertion triggers a system crash, resulting in a denial of service condition. Notably, exploitation does not require any privileges or user interaction, making it easier for attackers to cause disruption remotely. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting a medium severity due to the remote attack vector and lack of required privileges, balanced by the limited impact scope (availability only). MediaTek has assigned a patch ID (MOLY01685181) and issue ID (MSV-4760) for remediation, though no public patch link is currently available. No known exploits have been reported in the wild to date. This vulnerability primarily impacts devices using the affected MediaTek chipsets, which are widely deployed in smartphones and IoT devices globally.
Potential Impact
The primary impact of CVE-2025-20762 is a remote denial of service condition on devices using affected MediaTek chipsets. This can cause devices to crash or become unresponsive when connecting to a rogue base station, potentially disrupting communications and device availability. For organizations, this could lead to service interruptions, especially in environments relying on cellular connectivity for critical operations or IoT deployments. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this vulnerability, increasing the risk of widespread disruption in areas where rogue base stations can be deployed. However, the vulnerability does not allow data theft, modification, or privilege escalation, limiting its impact to availability. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are widely deployed. The impact is more significant in regions with high usage of affected MediaTek chipsets and where adversaries have the capability to deploy rogue base stations.
Mitigation Recommendations
1. Apply patches from MediaTek as soon as they become available to address the assertion failure in the modem firmware. 2. Network operators and organizations should deploy detection and mitigation systems to identify and block rogue base stations, such as using radio frequency monitoring tools and anomaly detection in cellular networks. 3. Device manufacturers should implement additional validation and error handling in modem firmware to prevent assertion failures. 4. Enterprises relying on cellular connectivity should consider multi-network redundancy or fallback mechanisms to maintain availability if one network is compromised. 5. Security teams should monitor threat intelligence feeds for any emerging exploits targeting this vulnerability. 6. End users should be advised to keep device firmware updated and avoid connecting to suspicious or unknown cellular networks. 7. Collaboration with mobile network operators to enhance base station authentication and integrity checks can reduce the risk of rogue base station attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.398Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695c6e793839e44175bdd395
Added to database: 1/6/2026, 2:07:53 AM
Last enriched: 3/30/2026, 7:18:25 PM
Last updated: 5/8/2026, 7:42:38 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.