Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20402: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

0
High
VulnerabilityCVE-2026-20402cvecve-2026-20402cwe-787
Published: Mon Feb 02 2026 (02/02/2026, 08:14:38 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:49:35 UTC

Technical Analysis

CVE-2026-20402 is a security vulnerability classified as an out-of-bounds write (CWE-787) affecting modem firmware versions NR15 on a broad range of MediaTek chipsets (MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797). The vulnerability results from improper input validation within the modem component, which can be triggered remotely when a user equipment (UE) device connects to a rogue base station controlled by an attacker. This leads to an out-of-bounds write condition that causes a system crash, effectively resulting in a denial of service (DoS) on the affected device. Exploitation does not require any user interaction or elevated privileges, increasing the risk profile. The flaw primarily impacts the availability of the device by crashing the modem subsystem, potentially disrupting network connectivity and dependent services. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vendor has assigned Patch ID MOLY00693083 to address this issue. The vulnerability is significant because it can be exploited remotely via network-level manipulation without user involvement, making it a critical concern for mobile devices and IoT equipment using these MediaTek chipsets.

Potential Impact

The primary impact of CVE-2026-20402 is a remote denial of service condition on devices using affected MediaTek modems. For European organizations, this could translate into temporary loss of mobile connectivity on affected devices, disrupting communications, business operations, and potentially critical services relying on mobile networks. Industries such as telecommunications, logistics, emergency services, and IoT deployments are particularly at risk. The ability of an attacker to induce a system crash remotely without user interaction or privileges means that rogue base stations could be used to target multiple devices in a geographic area, amplifying the disruption. This could also affect mobile network operators indirectly by increasing support costs and degrading user experience. While confidentiality and integrity impacts are not indicated, the availability impact alone is significant, especially for organizations with high dependency on mobile connectivity and real-time data transmission.

Mitigation Recommendations

1. Immediately apply the vendor-provided patch MOLY00693083 to all affected MediaTek modem firmware versions to remediate the vulnerability. 2. Implement network monitoring to detect and block rogue base stations or suspicious cellular network activity, using tools capable of identifying unauthorized base stations. 3. Employ mobile device management (MDM) solutions to enforce firmware updates and monitor device health across organizational assets. 4. Educate users and administrators about the risks of connecting to untrusted cellular networks, especially in sensitive or high-risk environments. 5. Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within organizational operational areas. 6. For IoT deployments using affected chipsets, consider network segmentation and fallback communication channels to maintain availability during potential attacks. 7. Regularly audit and inventory devices to identify those using vulnerable MediaTek chipsets and prioritize remediation accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f6a

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/2/2026, 8:49:35 AM

Last updated: 2/7/2026, 5:45:06 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats