Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20402: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
Medium
VulnerabilityCVE-2026-20402cvecve-2026-20402cwe-787
Published: Mon Feb 02 2026 (02/02/2026, 08:14:38 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:56:18 UTC

Technical Analysis

CVE-2026-20402 is an out-of-bounds write vulnerability (CWE-787) found in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, and MT8797. The flaw stems from improper input validation within the modem's NR15 firmware version, which can be triggered remotely when a user equipment (UE) device connects to a maliciously controlled rogue base station. This causes an out-of-bounds write leading to a system crash, effectively resulting in a denial of service condition. The vulnerability does not require any user interaction or elevated privileges, making it easier to exploit in scenarios where attackers can simulate or control base stations. The CVSS v3.1 score is 6.5, reflecting medium severity with an attack vector requiring adjacent network access (the radio interface), low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits have been reported in the wild, but the potential for disruption exists especially in environments where devices rely on vulnerable MediaTek modems. The issue was reserved in November 2025 and published in February 2026, with a patch identified as MOLY00693083 (issue MSV-5928), though patch distribution details are not provided. This vulnerability highlights risks in cellular infrastructure and device firmware where rogue base stations can be used as attack vectors.

Potential Impact

For European organizations, the primary impact is the risk of remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting enterprise mobile devices, IoT endpoints, and critical infrastructure relying on cellular connectivity. Telecom operators could see service degradation or outages if rogue base stations are deployed in their coverage areas. Industries such as finance, healthcare, transportation, and emergency services that depend on reliable mobile connectivity may experience operational interruptions. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations by forcing device reboots or service loss. Although no direct data compromise is indicated, availability impacts can cascade into broader business continuity issues. The lack of required user interaction or privileges lowers the barrier for attackers with access to radio interfaces, increasing the threat surface in dense urban or public environments where rogue base stations can be deployed.

Mitigation Recommendations

Organizations should prioritize applying the vendor-provided patch MOLY00693083 as soon as it becomes available for their devices. Network operators and security teams should implement detection mechanisms for rogue base stations, such as monitoring unusual base station identifiers and signal anomalies. Employing mobile threat defense solutions that can detect suspicious cellular network behavior can help mitigate exploitation risk. Device management policies should ensure firmware updates are deployed promptly across all affected endpoints. For critical infrastructure, consider network segmentation and fallback communication channels to maintain availability during potential DoS events. Collaboration with telecom providers to enhance base station authentication and integrity checks can reduce the feasibility of rogue base station attacks. Finally, raising user awareness about the risks of connecting to untrusted cellular networks can complement technical controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f6a

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/18/2026, 8:56:18 AM

Last updated: 3/24/2026, 10:14:15 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses