Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20762: CWE-617 Reachable Assertion in MediaTek, Inc. MediaTek chipset

0
Medium
VulnerabilityCVE-2025-20762cvecve-2025-20762cwe-617
Published: Tue Jan 06 2026 (01/06/2026, 01:46:34 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MediaTek chipset

Description

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01685181; Issue ID: MSV-4760.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:18:25 UTC

Technical Analysis

CVE-2025-20762 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of various MediaTek chipsets, including models MT6835, MT6878, MT6897, MT6991, MT8676, MT8755, MT8792, MT8863, MT8873, and MT8883 among others. The flaw arises from improper error handling within the modem's software, which leads to a reachable assertion failure. When a user equipment (UE) device connects to a maliciously controlled rogue base station, the assertion triggers a system crash, resulting in a denial of service condition. Notably, exploitation does not require any privileges or user interaction, making it easier for attackers to cause disruption remotely. The vulnerability affects the availability of the device but does not compromise confidentiality or integrity. The CVSS v3.1 base score is 6.5, reflecting a medium severity due to the remote attack vector and lack of required privileges, balanced by the limited impact scope (availability only). MediaTek has assigned a patch ID (MOLY01685181) and issue ID (MSV-4760) for remediation, though no public patch link is currently available. No known exploits have been reported in the wild to date. This vulnerability primarily impacts devices using the affected MediaTek chipsets, which are widely deployed in smartphones and IoT devices globally.

Potential Impact

The primary impact of CVE-2025-20762 is a remote denial of service condition on devices using affected MediaTek chipsets. This can cause devices to crash or become unresponsive when connecting to a rogue base station, potentially disrupting communications and device availability. For organizations, this could lead to service interruptions, especially in environments relying on cellular connectivity for critical operations or IoT deployments. The lack of required privileges or user interaction lowers the barrier for attackers to exploit this vulnerability, increasing the risk of widespread disruption in areas where rogue base stations can be deployed. However, the vulnerability does not allow data theft, modification, or privilege escalation, limiting its impact to availability. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are widely deployed. The impact is more significant in regions with high usage of affected MediaTek chipsets and where adversaries have the capability to deploy rogue base stations.

Mitigation Recommendations

1. Apply patches from MediaTek as soon as they become available to address the assertion failure in the modem firmware. 2. Network operators and organizations should deploy detection and mitigation systems to identify and block rogue base stations, such as using radio frequency monitoring tools and anomaly detection in cellular networks. 3. Device manufacturers should implement additional validation and error handling in modem firmware to prevent assertion failures. 4. Enterprises relying on cellular connectivity should consider multi-network redundancy or fallback mechanisms to maintain availability if one network is compromised. 5. Security teams should monitor threat intelligence feeds for any emerging exploits targeting this vulnerability. 6. End users should be advised to keep device firmware updated and avoid connecting to suspicious or unknown cellular networks. 7. Collaboration with mobile network operators to enhance base station authentication and integrity checks can reduce the risk of rogue base station attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.398Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695c6e793839e44175bdd395

Added to database: 1/6/2026, 2:07:53 AM

Last enriched: 3/30/2026, 7:18:25 PM

Last updated: 5/8/2026, 7:42:38 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses