Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2025-20790cvecve-2025-20790cwe-476
Published: Tue Dec 02 2025 (12/02/2025, 02:34:09 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.

AI-Powered Analysis

AILast updated: 12/02/2025, 03:21:48 UTC

Technical Analysis

CVE-2025-20790 is a vulnerability identified in multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The root cause is a NULL pointer dereference (CWE-476) in the modem firmware, specifically in the NR15 modem version, due to improper input validation. When a user equipment (UE) connects to a malicious or rogue base station controlled by an attacker, the modem processes crafted input that leads to dereferencing a NULL pointer, causing the modem system to crash. This results in a denial of service condition on the device, potentially disrupting network connectivity and device functionality. The attack vector is remote and does not require any user interaction or elevated privileges, increasing the risk of exploitation. The vulnerability was reserved in November 2024 and published in December 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The issue is tracked internally by MediaTek under patch ID MOLY01677581 and issue ID MSV-4701. The broad range of affected chipsets indicates a widespread impact across many mobile devices using MediaTek modems, commonly found in smartphones, IoT devices, and other connected hardware. The vulnerability primarily threatens device availability by causing crashes, which could be leveraged by attackers to disrupt communications or degrade service quality.

Potential Impact

For European organizations, the primary impact of CVE-2025-20790 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting employees' smartphones, IoT devices, and other connected equipment relying on cellular connectivity. Critical sectors such as telecommunications, emergency services, transportation, and industrial control systems that depend on reliable mobile connectivity could experience operational interruptions. The ease of exploitation without user interaction or privileges means attackers could target devices en masse by setting up rogue base stations in public or strategic locations. This could lead to widespread service degradation or outages, impacting business continuity and potentially causing financial and reputational damage. Additionally, the disruption of mobile network availability could hinder incident response and emergency communications. While confidentiality and integrity impacts are minimal, the availability impact is significant, especially in environments with high reliance on mobile connectivity.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Monitor vendor communications and apply MediaTek patches (MOLY01677581) promptly once released to address the vulnerability in modem firmware. 2) Implement network-level detection and mitigation of rogue base stations by deploying advanced mobile network security solutions capable of identifying and blocking unauthorized base stations. 3) Educate IT and security teams about the risks of rogue base stations and encourage vigilance in environments with sensitive operations. 4) For critical infrastructure, consider deploying multi-factor communication channels and fallback connectivity options to reduce reliance on a single cellular network. 5) Collaborate with mobile network operators to enhance detection of anomalous base station behavior and improve network integrity. 6) Conduct regular security assessments of mobile device fleets to ensure firmware is up to date and devices are not exposed to known vulnerabilities. 7) Where possible, restrict device connectivity to trusted networks and use VPNs to protect data in transit, although this does not prevent denial of service, it can help maintain confidentiality and integrity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f602f

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/2/2025, 3:21:48 AM

Last updated: 12/4/2025, 3:45:30 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats