CVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01717526; Issue ID: MSV-5591.
AI Analysis
Technical Summary
CVE-2025-20792 is a security vulnerability classified under CWE-617 (Reachable Assertion) affecting multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, and MT8791T. The root cause is improper input validation within the modem firmware, which can trigger an assertion failure leading to a system crash. This vulnerability can be exploited remotely without requiring user interaction or elevated privileges by an attacker operating a rogue base station. When a user equipment (UE) connects to such a malicious base station, crafted inputs can cause the modem to crash, resulting in a denial of service condition. The affected modem versions include Modem NR15. The vulnerability was reserved in November 2024 and published in December 2025. Although no public exploits are currently known, the impact on device availability is significant, especially for mobile devices relying on these chipsets. The vulnerability affects the modem's ability to maintain stable network connectivity, potentially disrupting communications. MediaTek has identified a patch (MOLY01717526) to address this issue, though it is not linked in the provided data. This vulnerability is particularly concerning for mobile network operators, enterprises, and critical infrastructure relying on stable mobile communications. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing risk. The vulnerability's scope covers a wide range of devices using these chipsets globally.
Potential Impact
For European organizations, the primary impact of CVE-2025-20792 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This can disrupt critical communications, especially for sectors relying on mobile connectivity such as emergency services, transportation, and industrial IoT deployments. Enterprises with mobile workforce devices or IoT devices using these chipsets may experience service interruptions, affecting business continuity. Telecom operators could face network stability issues if a significant number of devices are impacted by rogue base stations, potentially leading to customer dissatisfaction and reputational damage. The vulnerability could also be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity. Given the widespread use of MediaTek chipsets in consumer and industrial devices, the disruption could be broad but localized to areas where rogue base stations can be deployed. The lack of need for user interaction or elevated privileges means attackers can exploit this vulnerability stealthily and remotely, increasing the risk of large-scale denial of service events.
Mitigation Recommendations
1. Apply the official MediaTek patch (MOLY01717526) as soon as it becomes available and is integrated into device firmware updates. 2. Mobile device manufacturers and network operators should prioritize rolling out firmware updates to affected devices promptly. 3. Implement network monitoring solutions capable of detecting rogue base stations and anomalous signaling patterns to prevent devices from connecting to malicious infrastructure. 4. Employ mobile network security features such as mutual authentication and enhanced base station verification where supported to reduce the risk of rogue base station connections. 5. For enterprise and critical infrastructure deployments, consider using mobile device management (MDM) solutions to enforce timely updates and monitor device connectivity. 6. Educate users and administrators about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels when possible. 7. Collaborate with telecom providers to enhance detection and mitigation of rogue base stations within their networks. 8. Conduct regular security assessments of mobile and IoT devices to ensure firmware is up to date and vulnerabilities are addressed.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Sweden, Belgium, Finland
CVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01717526; Issue ID: MSV-5591.
AI-Powered Analysis
Technical Analysis
CVE-2025-20792 is a security vulnerability classified under CWE-617 (Reachable Assertion) affecting multiple MediaTek modem chipsets, including MT2735, MT6833 series, MT6853 series, MT6873 series, MT6880 series, MT6890 series, and MT8791T. The root cause is improper input validation within the modem firmware, which can trigger an assertion failure leading to a system crash. This vulnerability can be exploited remotely without requiring user interaction or elevated privileges by an attacker operating a rogue base station. When a user equipment (UE) connects to such a malicious base station, crafted inputs can cause the modem to crash, resulting in a denial of service condition. The affected modem versions include Modem NR15. The vulnerability was reserved in November 2024 and published in December 2025. Although no public exploits are currently known, the impact on device availability is significant, especially for mobile devices relying on these chipsets. The vulnerability affects the modem's ability to maintain stable network connectivity, potentially disrupting communications. MediaTek has identified a patch (MOLY01717526) to address this issue, though it is not linked in the provided data. This vulnerability is particularly concerning for mobile network operators, enterprises, and critical infrastructure relying on stable mobile communications. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing risk. The vulnerability's scope covers a wide range of devices using these chipsets globally.
Potential Impact
For European organizations, the primary impact of CVE-2025-20792 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This can disrupt critical communications, especially for sectors relying on mobile connectivity such as emergency services, transportation, and industrial IoT deployments. Enterprises with mobile workforce devices or IoT devices using these chipsets may experience service interruptions, affecting business continuity. Telecom operators could face network stability issues if a significant number of devices are impacted by rogue base stations, potentially leading to customer dissatisfaction and reputational damage. The vulnerability could also be exploited in targeted attacks against high-value individuals or organizations by deploying rogue base stations in proximity. Given the widespread use of MediaTek chipsets in consumer and industrial devices, the disruption could be broad but localized to areas where rogue base stations can be deployed. The lack of need for user interaction or elevated privileges means attackers can exploit this vulnerability stealthily and remotely, increasing the risk of large-scale denial of service events.
Mitigation Recommendations
1. Apply the official MediaTek patch (MOLY01717526) as soon as it becomes available and is integrated into device firmware updates. 2. Mobile device manufacturers and network operators should prioritize rolling out firmware updates to affected devices promptly. 3. Implement network monitoring solutions capable of detecting rogue base stations and anomalous signaling patterns to prevent devices from connecting to malicious infrastructure. 4. Employ mobile network security features such as mutual authentication and enhanced base station verification where supported to reduce the risk of rogue base station connections. 5. For enterprise and critical infrastructure deployments, consider using mobile device management (MDM) solutions to enforce timely updates and monitor device connectivity. 6. Educate users and administrators about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels when possible. 7. Collaborate with telecom providers to enhance detection and mitigation of rogue base stations within their networks. 8. Conduct regular security assessments of mobile and IoT devices to ensure firmware is up to date and vulnerabilities are addressed.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 692e57b3f2f793a7de7f6035
Added to database: 12/2/2025, 3:06:27 AM
Last enriched: 12/2/2025, 3:21:19 AM
Last updated: 12/4/2025, 8:39:19 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13543: CWE-434 Unrestricted Upload of File with Dangerous Type in rtowebsites PostGallery
HighCVE-2025-12997: CWE-639 Authorization Bypass Through User-Controlled Key in Medtronic CareLink Network
LowCVE-2025-12996: CWE-532 Insertion of Sensitive Information into Log File in Medtronic CareLink Network
MediumCVE-2025-12995: CWE-307 Improper Restriction of Excessive Authentication Attempts in Medtronic CareLink Network
HighCVE-2025-12994: CWE-204 Observable Response Discrepancy in Medtronic CareLink Network
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.