CVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.
AI Analysis
Technical Summary
CVE-2025-20790 is a vulnerability identified in multiple MediaTek modem chipsets (including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797) caused by a NULL pointer dereference (CWE-476) due to improper input validation in the modem firmware (Modem NR15). This flaw allows an attacker controlling a rogue base station to trigger a system crash remotely by sending malformed input to the modem when a user equipment (UE) connects. The attack vector requires no user interaction and no elevated privileges, making it a straightforward denial of service (DoS) attack against the modem’s availability. The vulnerability affects the modem’s ability to maintain network connectivity, potentially disrupting mobile communications. The CVSS v3.1 base score is 5.3 (medium severity) with vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack complexity is high, low privileges are required, and no impact on confidentiality or integrity but high impact on availability. No public exploits are known at this time, and MediaTek has assigned a patch ID (MOLY01677581) and issue ID (MSV-4701) for remediation. The vulnerability is significant for mobile devices relying on these chipsets, particularly in environments where stable connectivity is critical.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of mobile communications. Telecommunications providers, enterprises relying on mobile broadband for critical operations, and public safety organizations could experience service disruptions if devices with affected MediaTek chipsets connect to rogue base stations. The DoS condition could interrupt voice, data, and emergency services, impacting operational continuity. While confidentiality and integrity are not directly affected, the loss of availability can degrade user experience and potentially hinder critical communications. The risk is heightened in sectors with stringent uptime requirements such as healthcare, transportation, and government. Additionally, the presence of rogue base stations is a known tactic in advanced persistent threat (APT) scenarios, increasing the threat landscape for sensitive European targets. The medium severity score reflects the limited scope of impact but acknowledges the potential for widespread disruption given the prevalence of MediaTek chipsets in mobile devices.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Ensure all affected devices receive the official firmware update or patch from device manufacturers incorporating MediaTek’s fix (MOLY01677581). 2) Network operators should monitor for and mitigate rogue base stations using radio frequency (RF) detection tools and anomaly detection systems to identify unauthorized base stations. 3) Deploy mobile device management (MDM) solutions to enforce timely updates and restrict connections to untrusted networks. 4) Educate users about the risks of connecting to unknown or suspicious cellular networks, especially in high-risk environments. 5) Collaborate with telecom providers to enhance network authentication and integrity checks to prevent rogue base station exploitation. 6) For critical infrastructure, consider fallback communication channels and redundancy to maintain availability during potential DoS events. 7) Regularly audit and test mobile network security posture to detect and respond to emerging threats related to rogue base stations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.
AI-Powered Analysis
Technical Analysis
CVE-2025-20790 is a vulnerability identified in multiple MediaTek modem chipsets (including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797) caused by a NULL pointer dereference (CWE-476) due to improper input validation in the modem firmware (Modem NR15). This flaw allows an attacker controlling a rogue base station to trigger a system crash remotely by sending malformed input to the modem when a user equipment (UE) connects. The attack vector requires no user interaction and no elevated privileges, making it a straightforward denial of service (DoS) attack against the modem’s availability. The vulnerability affects the modem’s ability to maintain network connectivity, potentially disrupting mobile communications. The CVSS v3.1 base score is 5.3 (medium severity) with vector AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating network attack complexity is high, low privileges are required, and no impact on confidentiality or integrity but high impact on availability. No public exploits are known at this time, and MediaTek has assigned a patch ID (MOLY01677581) and issue ID (MSV-4701) for remediation. The vulnerability is significant for mobile devices relying on these chipsets, particularly in environments where stable connectivity is critical.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the availability of mobile communications. Telecommunications providers, enterprises relying on mobile broadband for critical operations, and public safety organizations could experience service disruptions if devices with affected MediaTek chipsets connect to rogue base stations. The DoS condition could interrupt voice, data, and emergency services, impacting operational continuity. While confidentiality and integrity are not directly affected, the loss of availability can degrade user experience and potentially hinder critical communications. The risk is heightened in sectors with stringent uptime requirements such as healthcare, transportation, and government. Additionally, the presence of rogue base stations is a known tactic in advanced persistent threat (APT) scenarios, increasing the threat landscape for sensitive European targets. The medium severity score reflects the limited scope of impact but acknowledges the potential for widespread disruption given the prevalence of MediaTek chipsets in mobile devices.
Mitigation Recommendations
European organizations should implement a multi-layered mitigation strategy: 1) Ensure all affected devices receive the official firmware update or patch from device manufacturers incorporating MediaTek’s fix (MOLY01677581). 2) Network operators should monitor for and mitigate rogue base stations using radio frequency (RF) detection tools and anomaly detection systems to identify unauthorized base stations. 3) Deploy mobile device management (MDM) solutions to enforce timely updates and restrict connections to untrusted networks. 4) Educate users about the risks of connecting to unknown or suspicious cellular networks, especially in high-risk environments. 5) Collaborate with telecom providers to enhance network authentication and integrity checks to prevent rogue base station exploitation. 6) For critical infrastructure, consider fallback communication channels and redundancy to maintain availability during potential DoS events. 7) Regularly audit and test mobile network security posture to detect and respond to emerging threats related to rogue base stations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f602f
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/9/2025, 4:40:59 AM
Last updated: 1/18/2026, 9:00:43 PM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1126: Unrestricted Upload in lwj flow
MediumCVE-2026-1125: Command Injection in D-Link DIR-823X
MediumCVE-2026-1124: SQL Injection in Yonyou KSOA
MediumCVE-2026-0863: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HighCVE-2026-1123: SQL Injection in Yonyou KSOA
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.