CVE-2026-20401: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738310; Issue ID: MSV-5933.
AI Analysis
Technical Summary
CVE-2026-20401 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8797, specifically affecting the Modem NR15 version. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion in the modem firmware can be triggered unexpectedly, leading to an uncaught exception and subsequent system crash. This crash results in a denial of service condition on the affected device. The attack vector involves a user equipment (UE) device connecting to a rogue base station controlled by an attacker. Because the vulnerability requires no additional execution privileges and no user interaction, it can be exploited remotely and silently. The rogue base station can send crafted signals or messages that trigger the assertion failure in the modem firmware. The impact is primarily on availability, as the device may crash or reboot, disrupting normal operations. The vulnerability affects a broad range of MediaTek modem chipsets widely used in smartphones, IoT devices, and embedded systems. No CVSS score has been assigned yet, and no public exploits have been reported. The vendor has acknowledged the issue and assigned a patch ID (MOLY01738310) and issue ID (MSV-5933), indicating that a fix is planned or available. The vulnerability's technical root cause is an assertion that does not properly handle unexpected conditions, leading to an uncaught exception and system instability. This type of flaw can be exploited by attackers setting up rogue base stations to target devices in their vicinity, potentially causing widespread service interruptions.
Potential Impact
For European organizations, the primary impact of CVE-2026-20401 is on the availability of devices using the affected MediaTek modem chipsets. Telecom operators, mobile network providers, and enterprises relying on mobile connectivity for critical communications could experience service disruptions if devices crash or reboot unexpectedly. This could affect mobile workforce productivity, IoT deployments, and critical infrastructure monitoring systems that depend on stable cellular connections. The vulnerability could be leveraged by attackers to conduct targeted denial of service attacks in specific geographic areas by deploying rogue base stations, potentially disrupting emergency services, financial transactions, or industrial control systems. The lack of required user interaction and low privilege requirements increase the risk of widespread exploitation, especially in densely populated urban areas with high mobile device usage. Although no known exploits are currently in the wild, the potential for disruption in sectors such as telecommunications, transportation, healthcare, and public safety is significant. Organizations may also face reputational damage and regulatory scrutiny if service outages occur due to this vulnerability.
Mitigation Recommendations
1. Apply vendor patches promptly once available (Patch ID: MOLY01738310) to address the assertion failure in the modem firmware. 2. Telecom operators should enhance detection and mitigation capabilities for rogue base stations, including deploying network monitoring tools that identify anomalous base station behavior. 3. Implement network access controls and anomaly detection on mobile networks to prevent unauthorized base station connections. 4. For critical IoT deployments using affected MediaTek chipsets, consider network segmentation and fallback communication methods to maintain availability during attacks. 5. Educate security teams and incident responders about the signs of rogue base station attacks and establish response protocols. 6. Collaborate with device manufacturers and mobile network providers to ensure timely updates and coordinated vulnerability disclosure. 7. Monitor threat intelligence feeds for emerging exploit techniques targeting this vulnerability. 8. Where possible, restrict device connectivity to trusted networks and disable automatic connections to unknown base stations. 9. Conduct regular security assessments of mobile infrastructure to identify and remediate potential attack vectors related to rogue base stations.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-20401: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738310; Issue ID: MSV-5933.
AI-Powered Analysis
Technical Analysis
CVE-2026-20401 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8797, specifically affecting the Modem NR15 version. The vulnerability is classified under CWE-617 (Reachable Assertion), indicating that an assertion in the modem firmware can be triggered unexpectedly, leading to an uncaught exception and subsequent system crash. This crash results in a denial of service condition on the affected device. The attack vector involves a user equipment (UE) device connecting to a rogue base station controlled by an attacker. Because the vulnerability requires no additional execution privileges and no user interaction, it can be exploited remotely and silently. The rogue base station can send crafted signals or messages that trigger the assertion failure in the modem firmware. The impact is primarily on availability, as the device may crash or reboot, disrupting normal operations. The vulnerability affects a broad range of MediaTek modem chipsets widely used in smartphones, IoT devices, and embedded systems. No CVSS score has been assigned yet, and no public exploits have been reported. The vendor has acknowledged the issue and assigned a patch ID (MOLY01738310) and issue ID (MSV-5933), indicating that a fix is planned or available. The vulnerability's technical root cause is an assertion that does not properly handle unexpected conditions, leading to an uncaught exception and system instability. This type of flaw can be exploited by attackers setting up rogue base stations to target devices in their vicinity, potentially causing widespread service interruptions.
Potential Impact
For European organizations, the primary impact of CVE-2026-20401 is on the availability of devices using the affected MediaTek modem chipsets. Telecom operators, mobile network providers, and enterprises relying on mobile connectivity for critical communications could experience service disruptions if devices crash or reboot unexpectedly. This could affect mobile workforce productivity, IoT deployments, and critical infrastructure monitoring systems that depend on stable cellular connections. The vulnerability could be leveraged by attackers to conduct targeted denial of service attacks in specific geographic areas by deploying rogue base stations, potentially disrupting emergency services, financial transactions, or industrial control systems. The lack of required user interaction and low privilege requirements increase the risk of widespread exploitation, especially in densely populated urban areas with high mobile device usage. Although no known exploits are currently in the wild, the potential for disruption in sectors such as telecommunications, transportation, healthcare, and public safety is significant. Organizations may also face reputational damage and regulatory scrutiny if service outages occur due to this vulnerability.
Mitigation Recommendations
1. Apply vendor patches promptly once available (Patch ID: MOLY01738310) to address the assertion failure in the modem firmware. 2. Telecom operators should enhance detection and mitigation capabilities for rogue base stations, including deploying network monitoring tools that identify anomalous base station behavior. 3. Implement network access controls and anomaly detection on mobile networks to prevent unauthorized base station connections. 4. For critical IoT deployments using affected MediaTek chipsets, consider network segmentation and fallback communication methods to maintain availability during attacks. 5. Educate security teams and incident responders about the signs of rogue base station attacks and establish response protocols. 6. Collaborate with device manufacturers and mobile network providers to ensure timely updates and coordinated vulnerability disclosure. 7. Monitor threat intelligence feeds for emerging exploit techniques targeting this vulnerability. 8. Where possible, restrict device connectivity to trusted networks and disable automatic connections to unknown base stations. 9. Conduct regular security assessments of mobile infrastructure to identify and remediate potential attack vectors related to rogue base stations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.006Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f67
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/2/2026, 8:49:49 AM
Last updated: 2/5/2026, 7:11:44 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brechtvds Dynamic Widget Content
MediumCVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
MediumCVE-2026-0867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in catchthemes Essential Widgets
MediumCVE-2025-15080: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-R Series R08PCPU
HighCVE-2025-61732: CWE-94: Improper Control of Generation of Code ('Code Injection') in Go toolchain cmd/cgo
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.