Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T

0
Medium
VulnerabilityCVE-2025-20792cvecve-2025-20792cwe-617
Published: Tue Dec 02 2025 (12/02/2025, 02:34:02 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01717526; Issue ID: MSV-5591.

AI-Powered Analysis

AILast updated: 12/09/2025, 04:39:11 UTC

Technical Analysis

CVE-2025-20792 is a vulnerability classified under CWE-617 (Reachable Assertion) affecting a broad range of MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, and MT8791T. The flaw resides in the modem firmware's input validation logic, where improper handling of certain inputs can trigger an assertion failure, causing the modem subsystem to crash. This results in a denial of service condition on the device. The vulnerability can be exploited remotely by an attacker who sets up a rogue base station that a user equipment (UE) connects to, requiring no user interaction and minimal privileges. The attack complexity is high, meaning the attacker must have precise control over the rogue base station environment. The impact is limited to availability, with no confidentiality or integrity compromise reported. The vulnerability affects devices running Modem NR15 firmware versions prior to the patch MOLY01717526. While no public exploits are known, the broad chipset coverage and potential for remote DoS make this a significant concern for mobile device users and network operators. The vulnerability was published on December 2, 2025, with a CVSS v3.1 score of 5.3, indicating a medium severity level.

Potential Impact

For European organizations, the primary impact of CVE-2025-20792 is the potential for remote denial of service on mobile devices using affected MediaTek chipsets. This can disrupt critical communications, especially for sectors relying heavily on mobile connectivity such as emergency services, transportation, finance, and remote workforces. Telecom operators may face increased support costs and customer dissatisfaction if rogue base stations are used to exploit this vulnerability. Industrial IoT devices and embedded systems using these chipsets could also experience outages, affecting operational continuity. Although the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on business operations and service delivery. The requirement for connection to a rogue base station limits the attack surface but does not eliminate risk, particularly in urban or high-density areas where attackers might deploy such infrastructure covertly.

Mitigation Recommendations

1. Apply the official MediaTek patch MOLY01717526 as soon as it becomes available for all affected devices to remediate the vulnerability at the firmware level. 2. Network operators and enterprises should implement detection and mitigation mechanisms for rogue base stations, including radio frequency monitoring and anomaly detection systems. 3. Encourage users to update their device firmware regularly and avoid connecting to untrusted or unknown cellular networks. 4. Deploy mobile device management (MDM) solutions that can enforce firmware updates and monitor device connectivity patterns. 5. Collaborate with telecom providers to enhance base station authentication and integrity checks to prevent rogue base station attacks. 6. For critical infrastructure relying on affected chipsets, consider network segmentation and fallback communication methods to maintain availability during potential DoS events. 7. Conduct regular security assessments and penetration testing focused on cellular network vulnerabilities within organizational environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2024-11-01T01:21:50.402Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692e57b3f2f793a7de7f6035

Added to database: 12/2/2025, 3:06:27 AM

Last enriched: 12/9/2025, 4:39:11 AM

Last updated: 1/17/2026, 7:43:05 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats