CVE-2025-20793: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01430930; Issue ID: MSV-4836.
AI Analysis
Technical Summary
CVE-2025-20793 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting numerous MediaTek modem chipsets including MT2735, MT2737, MT6813, MT6815, and many others spanning multiple modem versions (NR15 through NR17R). The vulnerability stems from incorrect error handling in the modem firmware, which can cause the system to dereference a NULL pointer, resulting in a system crash. This crash leads to a denial of service condition on the affected device. The attack vector involves a user equipment (UE) connecting to a rogue base station controlled by an attacker. No additional execution privileges or user interaction are required, making the attack remotely executable and stealthy. The flaw impacts the modem’s ability to maintain stable network connectivity, potentially disrupting mobile communications. The vulnerability was reserved in November 2024 and published in January 2026. Although no public exploits are known, the broad range of affected chipsets and the critical role of modems in mobile devices make this a significant threat. The patch identified as MOLY01430930 addresses the issue but requires deployment by device manufacturers and carriers. The vulnerability primarily impacts device availability, with indirect effects on confidentiality and integrity being minimal. The lack of a CVSS score necessitates a severity assessment based on technical factors.
Potential Impact
For European organizations, the primary impact of CVE-2025-20793 is the potential for remote denial of service on mobile devices using affected MediaTek modems. This can disrupt critical communications, especially for enterprises relying on mobile networks for operational continuity, emergency services, or IoT deployments. Telecom providers may experience increased network instability or customer complaints due to devices crashing when connecting to rogue or misconfigured base stations. The vulnerability could be exploited by attackers setting up rogue base stations in public or sensitive areas to cause widespread service outages. This risk extends to sectors such as finance, healthcare, transportation, and government, where mobile connectivity is essential. Additionally, the disruption could affect supply chains and remote work capabilities. The lack of user interaction and privilege requirements lowers the barrier for exploitation, increasing the threat surface. While confidentiality and data integrity are less impacted, availability degradation can have cascading effects on business operations and public safety.
Mitigation Recommendations
1. Deploy the official patch (MOLY01430930) as soon as it becomes available from device manufacturers or carriers to remediate the NULL pointer dereference flaw. 2. Implement network monitoring solutions to detect and alert on the presence of rogue base stations or suspicious network behavior indicative of an attack. 3. Encourage users and organizations to update device firmware regularly and verify that modems are running secure, updated versions. 4. Telecom operators should strengthen base station authentication and validation mechanisms to prevent unauthorized rogue stations from attracting UE connections. 5. Employ anomaly detection on mobile network traffic to identify unusual disconnections or crashes that may signal exploitation attempts. 6. For critical infrastructure, consider multi-factor communication channels or fallback mechanisms to maintain connectivity during outages. 7. Collaborate with device vendors to ensure timely security updates and transparency regarding vulnerability status. 8. Educate end-users and IT staff about the risks of connecting to unknown or untrusted networks, even though user interaction is not required for this exploit, awareness can help in broader threat mitigation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2025-20793: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01430930; Issue ID: MSV-4836.
AI-Powered Analysis
Technical Analysis
CVE-2025-20793 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting numerous MediaTek modem chipsets including MT2735, MT2737, MT6813, MT6815, and many others spanning multiple modem versions (NR15 through NR17R). The vulnerability stems from incorrect error handling in the modem firmware, which can cause the system to dereference a NULL pointer, resulting in a system crash. This crash leads to a denial of service condition on the affected device. The attack vector involves a user equipment (UE) connecting to a rogue base station controlled by an attacker. No additional execution privileges or user interaction are required, making the attack remotely executable and stealthy. The flaw impacts the modem’s ability to maintain stable network connectivity, potentially disrupting mobile communications. The vulnerability was reserved in November 2024 and published in January 2026. Although no public exploits are known, the broad range of affected chipsets and the critical role of modems in mobile devices make this a significant threat. The patch identified as MOLY01430930 addresses the issue but requires deployment by device manufacturers and carriers. The vulnerability primarily impacts device availability, with indirect effects on confidentiality and integrity being minimal. The lack of a CVSS score necessitates a severity assessment based on technical factors.
Potential Impact
For European organizations, the primary impact of CVE-2025-20793 is the potential for remote denial of service on mobile devices using affected MediaTek modems. This can disrupt critical communications, especially for enterprises relying on mobile networks for operational continuity, emergency services, or IoT deployments. Telecom providers may experience increased network instability or customer complaints due to devices crashing when connecting to rogue or misconfigured base stations. The vulnerability could be exploited by attackers setting up rogue base stations in public or sensitive areas to cause widespread service outages. This risk extends to sectors such as finance, healthcare, transportation, and government, where mobile connectivity is essential. Additionally, the disruption could affect supply chains and remote work capabilities. The lack of user interaction and privilege requirements lowers the barrier for exploitation, increasing the threat surface. While confidentiality and data integrity are less impacted, availability degradation can have cascading effects on business operations and public safety.
Mitigation Recommendations
1. Deploy the official patch (MOLY01430930) as soon as it becomes available from device manufacturers or carriers to remediate the NULL pointer dereference flaw. 2. Implement network monitoring solutions to detect and alert on the presence of rogue base stations or suspicious network behavior indicative of an attack. 3. Encourage users and organizations to update device firmware regularly and verify that modems are running secure, updated versions. 4. Telecom operators should strengthen base station authentication and validation mechanisms to prevent unauthorized rogue stations from attracting UE connections. 5. Employ anomaly detection on mobile network traffic to identify unusual disconnections or crashes that may signal exploitation attempts. 6. For critical infrastructure, consider multi-factor communication channels or fallback mechanisms to maintain connectivity during outages. 7. Collaborate with device vendors to ensure timely security updates and transparency regarding vulnerability status. 8. Educate end-users and IT staff about the risks of connecting to unknown or untrusted networks, even though user interaction is not required for this exploit, awareness can help in broader threat mitigation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2024-11-01T01:21:50.402Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695c6e7a3839e44175bdd3d6
Added to database: 1/6/2026, 2:07:54 AM
Last enriched: 1/6/2026, 2:26:32 AM
Last updated: 1/8/2026, 10:18:32 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21871: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.