CVE-2026-20402: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.
AI Analysis
Technical Summary
CVE-2026-20402 is an out-of-bounds write vulnerability (CWE-787) found in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, and MT8797. The flaw stems from improper input validation within the modem's NR15 firmware version, which can be triggered remotely when a user equipment (UE) device connects to a maliciously controlled rogue base station. This causes an out-of-bounds write leading to a system crash, effectively resulting in a denial of service condition. The vulnerability does not require any user interaction or elevated privileges, making it easier to exploit in scenarios where attackers can simulate or control base stations. The CVSS v3.1 score is 6.5, reflecting medium severity with an attack vector requiring adjacent network access (the radio interface), low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits have been reported in the wild, but the potential for disruption exists especially in environments where devices rely on vulnerable MediaTek modems. The issue was reserved in November 2025 and published in February 2026, with a patch identified as MOLY00693083 (issue MSV-5928), though patch distribution details are not provided. This vulnerability highlights risks in cellular infrastructure and device firmware where rogue base stations can be used as attack vectors.
Potential Impact
For European organizations, the primary impact is the risk of remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting enterprise mobile devices, IoT endpoints, and critical infrastructure relying on cellular connectivity. Telecom operators could see service degradation or outages if rogue base stations are deployed in their coverage areas. Industries such as finance, healthcare, transportation, and emergency services that depend on reliable mobile connectivity may experience operational interruptions. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations by forcing device reboots or service loss. Although no direct data compromise is indicated, availability impacts can cascade into broader business continuity issues. The lack of required user interaction or privileges lowers the barrier for attackers with access to radio interfaces, increasing the threat surface in dense urban or public environments where rogue base stations can be deployed.
Mitigation Recommendations
Organizations should prioritize applying the vendor-provided patch MOLY00693083 as soon as it becomes available for their devices. Network operators and security teams should implement detection mechanisms for rogue base stations, such as monitoring unusual base station identifiers and signal anomalies. Employing mobile threat defense solutions that can detect suspicious cellular network behavior can help mitigate exploitation risk. Device management policies should ensure firmware updates are deployed promptly across all affected endpoints. For critical infrastructure, consider network segmentation and fallback communication channels to maintain availability during potential DoS events. Collaboration with telecom providers to enhance base station authentication and integrity checks can reduce the feasibility of rogue base station attacks. Finally, raising user awareness about the risks of connecting to untrusted cellular networks can complement technical controls.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-20402: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00693083; Issue ID: MSV-5928.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20402 is an out-of-bounds write vulnerability (CWE-787) found in the modem firmware of numerous MediaTek chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, and MT8797. The flaw stems from improper input validation within the modem's NR15 firmware version, which can be triggered remotely when a user equipment (UE) device connects to a maliciously controlled rogue base station. This causes an out-of-bounds write leading to a system crash, effectively resulting in a denial of service condition. The vulnerability does not require any user interaction or elevated privileges, making it easier to exploit in scenarios where attackers can simulate or control base stations. The CVSS v3.1 score is 6.5, reflecting medium severity with an attack vector requiring adjacent network access (the radio interface), low attack complexity, no privileges required, no user interaction, and impact limited to availability (system crash). No known exploits have been reported in the wild, but the potential for disruption exists especially in environments where devices rely on vulnerable MediaTek modems. The issue was reserved in November 2025 and published in February 2026, with a patch identified as MOLY00693083 (issue MSV-5928), though patch distribution details are not provided. This vulnerability highlights risks in cellular infrastructure and device firmware where rogue base stations can be used as attack vectors.
Potential Impact
For European organizations, the primary impact is the risk of remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, affecting enterprise mobile devices, IoT endpoints, and critical infrastructure relying on cellular connectivity. Telecom operators could see service degradation or outages if rogue base stations are deployed in their coverage areas. Industries such as finance, healthcare, transportation, and emergency services that depend on reliable mobile connectivity may experience operational interruptions. Additionally, the vulnerability could be leveraged in targeted attacks against high-value individuals or organizations by forcing device reboots or service loss. Although no direct data compromise is indicated, availability impacts can cascade into broader business continuity issues. The lack of required user interaction or privileges lowers the barrier for attackers with access to radio interfaces, increasing the threat surface in dense urban or public environments where rogue base stations can be deployed.
Mitigation Recommendations
Organizations should prioritize applying the vendor-provided patch MOLY00693083 as soon as it becomes available for their devices. Network operators and security teams should implement detection mechanisms for rogue base stations, such as monitoring unusual base station identifiers and signal anomalies. Employing mobile threat defense solutions that can detect suspicious cellular network behavior can help mitigate exploitation risk. Device management policies should ensure firmware updates are deployed promptly across all affected endpoints. For critical infrastructure, consider network segmentation and fallback communication channels to maintain availability during potential DoS events. Collaboration with telecom providers to enhance base station authentication and integrity checks can reduce the feasibility of rogue base station attacks. Finally, raising user awareness about the risks of connecting to untrusted cellular networks can complement technical controls.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.007Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f6a
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/18/2026, 8:56:18 AM
Last updated: 3/24/2026, 10:14:15 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.