CVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661189; Issue ID: MSV-4298.
AI Analysis
Technical Summary
CVE-2025-20791 is a vulnerability identified in several MediaTek modem chipsets (including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797) that affects the modem firmware version NR15. The root cause is an incorrect error handling mechanism that leads to a reachable assertion failure within the modem's software. When a user equipment (UE) device equipped with these chipsets connects to a rogue base station controlled by an attacker, the assertion can be triggered, causing the modem system to crash. This results in a denial of service condition, disrupting the device's ability to maintain network connectivity. The vulnerability requires no additional execution privileges and does not need user interaction, making it remotely exploitable by an attacker who can set up a malicious base station. This attack vector is particularly concerning because rogue base stations can be deployed in proximity to targets without their knowledge. The flaw is categorized under CWE-617 (Reachable Assertion), indicating that the software does not properly validate conditions before asserting, leading to unexpected termination. Although no exploits have been reported in the wild, the vulnerability is published and patches are expected from MediaTek under Patch ID MOLY01661189. The broad range of affected chipsets suggests a wide impact across many mobile devices using MediaTek modems, including smartphones and IoT devices. The vulnerability primarily impacts availability by causing system crashes and potential service outages. Confidentiality and integrity impacts are not indicated. The lack of a CVSS score necessitates an assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2025-20791 is the potential disruption of mobile communications due to modem crashes caused by rogue base stations. This can affect critical sectors such as telecommunications providers, emergency services, transportation, and enterprises relying on mobile connectivity for operations. Denial of service at the device level can lead to loss of communication, impacting business continuity and safety-critical functions. The vulnerability could also be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in strategic locations. Given the increasing reliance on mobile devices and IoT in Europe, widespread exploitation could degrade network reliability and user trust. Additionally, industries with mobile-dependent infrastructure, such as smart cities and industrial automation, may face operational risks. Although no data breach or code execution is involved, the availability impact alone can have significant operational and reputational consequences. The threat is heightened by the ease of exploitation and lack of user interaction requirements.
Mitigation Recommendations
1. Apply official patches from MediaTek as soon as they are released (Patch ID MOLY01661189). Coordinate with device manufacturers and mobile operators to ensure timely firmware updates. 2. Mobile network operators should monitor for and mitigate rogue base stations by deploying detection systems that identify unauthorized or suspicious base stations in their coverage areas. 3. Enterprises should implement mobile device management (MDM) solutions to enforce firmware updates and monitor device health. 4. Users and organizations should avoid connecting to untrusted or unknown cellular networks, especially in sensitive environments. 5. Security teams should collaborate with telecom providers to share threat intelligence regarding rogue base station activities. 6. For critical infrastructure, consider network segmentation and fallback communication channels to reduce reliance on vulnerable mobile devices. 7. Encourage manufacturers to improve error handling and assertion checks in modem firmware to prevent similar vulnerabilities. 8. Conduct regular security assessments of mobile devices and IoT endpoints using affected chipsets to identify unpatched systems.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01661189; Issue ID: MSV-4298.
AI-Powered Analysis
Technical Analysis
CVE-2025-20791 is a vulnerability identified in several MediaTek modem chipsets (including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, MT8675, MT8771, MT8791 series, and MT8797) that affects the modem firmware version NR15. The root cause is an incorrect error handling mechanism that leads to a reachable assertion failure within the modem's software. When a user equipment (UE) device equipped with these chipsets connects to a rogue base station controlled by an attacker, the assertion can be triggered, causing the modem system to crash. This results in a denial of service condition, disrupting the device's ability to maintain network connectivity. The vulnerability requires no additional execution privileges and does not need user interaction, making it remotely exploitable by an attacker who can set up a malicious base station. This attack vector is particularly concerning because rogue base stations can be deployed in proximity to targets without their knowledge. The flaw is categorized under CWE-617 (Reachable Assertion), indicating that the software does not properly validate conditions before asserting, leading to unexpected termination. Although no exploits have been reported in the wild, the vulnerability is published and patches are expected from MediaTek under Patch ID MOLY01661189. The broad range of affected chipsets suggests a wide impact across many mobile devices using MediaTek modems, including smartphones and IoT devices. The vulnerability primarily impacts availability by causing system crashes and potential service outages. Confidentiality and integrity impacts are not indicated. The lack of a CVSS score necessitates an assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2025-20791 is the potential disruption of mobile communications due to modem crashes caused by rogue base stations. This can affect critical sectors such as telecommunications providers, emergency services, transportation, and enterprises relying on mobile connectivity for operations. Denial of service at the device level can lead to loss of communication, impacting business continuity and safety-critical functions. The vulnerability could also be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in strategic locations. Given the increasing reliance on mobile devices and IoT in Europe, widespread exploitation could degrade network reliability and user trust. Additionally, industries with mobile-dependent infrastructure, such as smart cities and industrial automation, may face operational risks. Although no data breach or code execution is involved, the availability impact alone can have significant operational and reputational consequences. The threat is heightened by the ease of exploitation and lack of user interaction requirements.
Mitigation Recommendations
1. Apply official patches from MediaTek as soon as they are released (Patch ID MOLY01661189). Coordinate with device manufacturers and mobile operators to ensure timely firmware updates. 2. Mobile network operators should monitor for and mitigate rogue base stations by deploying detection systems that identify unauthorized or suspicious base stations in their coverage areas. 3. Enterprises should implement mobile device management (MDM) solutions to enforce firmware updates and monitor device health. 4. Users and organizations should avoid connecting to untrusted or unknown cellular networks, especially in sensitive environments. 5. Security teams should collaborate with telecom providers to share threat intelligence regarding rogue base station activities. 6. For critical infrastructure, consider network segmentation and fallback communication channels to reduce reliance on vulnerable mobile devices. 7. Encourage manufacturers to improve error handling and assertion checks in modem firmware to prevent similar vulnerabilities. 8. Conduct regular security assessments of mobile devices and IoT endpoints using affected chipsets to identify unpatched systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f6032
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/2/2025, 3:21:34 AM
Last updated: 12/4/2025, 8:36:18 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12997: CWE-639 Authorization Bypass Through User-Controlled Key in Medtronic CareLink Network
LowCVE-2025-12996: CWE-532 Insertion of Sensitive Information into Log File in Medtronic CareLink Network
MediumCVE-2025-12995: CWE-307 Improper Restriction of Excessive Authentication Attempts in Medtronic CareLink Network
HighCVE-2025-12994: CWE-204 Observable Response Discrepancy in Medtronic CareLink Network
MediumCVE-2025-63499: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.