CVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.
AI Analysis
Technical Summary
CVE-2025-20790 is a vulnerability identified in multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The root cause is a NULL pointer dereference (CWE-476) in the modem firmware, specifically in the NR15 modem version, due to improper input validation. When a user equipment (UE) connects to a malicious or rogue base station controlled by an attacker, the modem processes crafted input that leads to dereferencing a NULL pointer, causing the modem system to crash. This results in a denial of service condition on the device, potentially disrupting network connectivity and device functionality. The attack vector is remote and does not require any user interaction or elevated privileges, increasing the risk of exploitation. The vulnerability was reserved in November 2024 and published in December 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The issue is tracked internally by MediaTek under patch ID MOLY01677581 and issue ID MSV-4701. The broad range of affected chipsets indicates a widespread impact across many mobile devices using MediaTek modems, commonly found in smartphones, IoT devices, and other connected hardware. The vulnerability primarily threatens device availability by causing crashes, which could be leveraged by attackers to disrupt communications or degrade service quality.
Potential Impact
For European organizations, the primary impact of CVE-2025-20790 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting employees' smartphones, IoT devices, and other connected equipment relying on cellular connectivity. Critical sectors such as telecommunications, emergency services, transportation, and industrial control systems that depend on reliable mobile connectivity could experience operational interruptions. The ease of exploitation without user interaction or privileges means attackers could target devices en masse by setting up rogue base stations in public or strategic locations. This could lead to widespread service degradation or outages, impacting business continuity and potentially causing financial and reputational damage. Additionally, the disruption of mobile network availability could hinder incident response and emergency communications. While confidentiality and integrity impacts are minimal, the availability impact is significant, especially in environments with high reliance on mobile connectivity.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Monitor vendor communications and apply MediaTek patches (MOLY01677581) promptly once released to address the vulnerability in modem firmware. 2) Implement network-level detection and mitigation of rogue base stations by deploying advanced mobile network security solutions capable of identifying and blocking unauthorized base stations. 3) Educate IT and security teams about the risks of rogue base stations and encourage vigilance in environments with sensitive operations. 4) For critical infrastructure, consider deploying multi-factor communication channels and fallback connectivity options to reduce reliance on a single cellular network. 5) Collaborate with mobile network operators to enhance detection of anomalous base station behavior and improve network integrity. 6) Conduct regular security assessments of mobile device fleets to ensure firmware is up to date and devices are not exposed to known vulnerabilities. 7) Where possible, restrict device connectivity to trusted networks and use VPNs to protect data in transit, although this does not prevent denial of service, it can help maintain confidentiality and integrity.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01677581; Issue ID: MSV-4701.
AI-Powered Analysis
Technical Analysis
CVE-2025-20790 is a vulnerability identified in multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797. The root cause is a NULL pointer dereference (CWE-476) in the modem firmware, specifically in the NR15 modem version, due to improper input validation. When a user equipment (UE) connects to a malicious or rogue base station controlled by an attacker, the modem processes crafted input that leads to dereferencing a NULL pointer, causing the modem system to crash. This results in a denial of service condition on the device, potentially disrupting network connectivity and device functionality. The attack vector is remote and does not require any user interaction or elevated privileges, increasing the risk of exploitation. The vulnerability was reserved in November 2024 and published in December 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The issue is tracked internally by MediaTek under patch ID MOLY01677581 and issue ID MSV-4701. The broad range of affected chipsets indicates a widespread impact across many mobile devices using MediaTek modems, commonly found in smartphones, IoT devices, and other connected hardware. The vulnerability primarily threatens device availability by causing crashes, which could be leveraged by attackers to disrupt communications or degrade service quality.
Potential Impact
For European organizations, the primary impact of CVE-2025-20790 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting employees' smartphones, IoT devices, and other connected equipment relying on cellular connectivity. Critical sectors such as telecommunications, emergency services, transportation, and industrial control systems that depend on reliable mobile connectivity could experience operational interruptions. The ease of exploitation without user interaction or privileges means attackers could target devices en masse by setting up rogue base stations in public or strategic locations. This could lead to widespread service degradation or outages, impacting business continuity and potentially causing financial and reputational damage. Additionally, the disruption of mobile network availability could hinder incident response and emergency communications. While confidentiality and integrity impacts are minimal, the availability impact is significant, especially in environments with high reliance on mobile connectivity.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Monitor vendor communications and apply MediaTek patches (MOLY01677581) promptly once released to address the vulnerability in modem firmware. 2) Implement network-level detection and mitigation of rogue base stations by deploying advanced mobile network security solutions capable of identifying and blocking unauthorized base stations. 3) Educate IT and security teams about the risks of rogue base stations and encourage vigilance in environments with sensitive operations. 4) For critical infrastructure, consider deploying multi-factor communication channels and fallback connectivity options to reduce reliance on a single cellular network. 5) Collaborate with mobile network operators to enhance detection of anomalous base station behavior and improve network integrity. 6) Conduct regular security assessments of mobile device fleets to ensure firmware is up to date and devices are not exposed to known vulnerabilities. 7) Where possible, restrict device connectivity to trusted networks and use VPNs to protect data in transit, although this does not prevent denial of service, it can help maintain confidentiality and integrity.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f602f
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/2/2025, 3:21:48 AM
Last updated: 12/4/2025, 3:45:30 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57213: n/a
UnknownCVE-2025-57212: n/a
UnknownCVE-2025-57210: n/a
UnknownCVE-2025-14024
UnknownCVE-2025-8074: Origin Validation Error in Synology BeeDrive for desktop
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.