CVE-2026-20403: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.
AI Analysis
Technical Summary
CVE-2026-20403 is a critical security vulnerability identified in a broad range of MediaTek modem chipsets, including MT2735 through MT8893 series, specifically affecting modem firmware versions NR15, NR16, NR17, and NR17R. The vulnerability is classified as an out-of-bounds write (CWE-787) caused by a missing bounds check in the modem's codebase. This flaw allows an attacker controlling a rogue base station to send specially crafted signals that trigger a memory corruption condition, resulting in a system crash of the modem. The crash leads to a denial of service (DoS) condition on the affected device, disrupting its network connectivity. Notably, exploitation does not require any user interaction or elevated privileges on the device, making it remotely exploitable once the device connects to the malicious base station. The vulnerability affects a wide range of MediaTek chipsets commonly integrated into smartphones, IoT devices, and embedded systems. Although no public exploits have been reported, the potential impact on device availability and network reliability is significant. MediaTek has released patches identified as MOLY01689254 for NR15 and NR16, and MOLY01689259 for NR17 and NR17R modems to address this issue. The vulnerability was reserved in November 2025 and published in February 2026, indicating recent discovery and disclosure. Due to the nature of the flaw, attackers could cause widespread service disruption in cellular networks by targeting vulnerable devices connected to rogue base stations, which could be deployed in targeted attack scenarios or by malicious actors seeking to degrade network services.
Potential Impact
For European organizations, the primary impact of CVE-2026-20403 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting business operations reliant on cellular connectivity, including critical infrastructure, emergency services, and IoT deployments. The vulnerability could be exploited to cause network outages or degrade service quality by forcing devices offline when they connect to attacker-controlled rogue base stations. This risk is heightened in sectors with high dependency on mobile networks, such as telecommunications providers, transportation, healthcare, and public safety. Additionally, the disruption could cascade to impact supply chains and remote workforce connectivity. Since exploitation requires no user interaction and no elevated privileges, the attack surface is broad, increasing the likelihood of opportunistic attacks. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains. Organizations may also face reputational damage and regulatory scrutiny if service disruptions affect customers or critical services. Overall, the vulnerability poses a significant threat to network availability and operational continuity in Europe.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT8893 series) and verify firmware versions NR15, NR16, NR17, or NR17R. 2) Apply the official patches released by MediaTek (MOLY01689254 for NR15/NR16 and MOLY01689259 for NR17/NR17R) immediately to remediate the vulnerability. 3) Collaborate with device manufacturers and mobile network operators to ensure timely firmware updates and deployment. 4) Implement network monitoring to detect connections to suspicious or rogue base stations, leveraging anomaly detection and threat intelligence feeds. 5) Employ base station authentication and validation mechanisms where possible to reduce the risk of rogue base station attacks. 6) Educate security teams about the threat vector involving rogue base stations and prepare incident response plans for potential DoS events. 7) For critical infrastructure, consider deploying redundant communication channels or failover mechanisms to maintain connectivity during potential disruptions. 8) Engage with telecom providers to understand their mitigation strategies and ensure alignment with security best practices. These targeted actions go beyond generic advice by focusing on device inventory, patch management, network defense, and operational resilience specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-20403: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
Description
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.
AI-Powered Analysis
Technical Analysis
CVE-2026-20403 is a critical security vulnerability identified in a broad range of MediaTek modem chipsets, including MT2735 through MT8893 series, specifically affecting modem firmware versions NR15, NR16, NR17, and NR17R. The vulnerability is classified as an out-of-bounds write (CWE-787) caused by a missing bounds check in the modem's codebase. This flaw allows an attacker controlling a rogue base station to send specially crafted signals that trigger a memory corruption condition, resulting in a system crash of the modem. The crash leads to a denial of service (DoS) condition on the affected device, disrupting its network connectivity. Notably, exploitation does not require any user interaction or elevated privileges on the device, making it remotely exploitable once the device connects to the malicious base station. The vulnerability affects a wide range of MediaTek chipsets commonly integrated into smartphones, IoT devices, and embedded systems. Although no public exploits have been reported, the potential impact on device availability and network reliability is significant. MediaTek has released patches identified as MOLY01689254 for NR15 and NR16, and MOLY01689259 for NR17 and NR17R modems to address this issue. The vulnerability was reserved in November 2025 and published in February 2026, indicating recent discovery and disclosure. Due to the nature of the flaw, attackers could cause widespread service disruption in cellular networks by targeting vulnerable devices connected to rogue base stations, which could be deployed in targeted attack scenarios or by malicious actors seeking to degrade network services.
Potential Impact
For European organizations, the primary impact of CVE-2026-20403 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting business operations reliant on cellular connectivity, including critical infrastructure, emergency services, and IoT deployments. The vulnerability could be exploited to cause network outages or degrade service quality by forcing devices offline when they connect to attacker-controlled rogue base stations. This risk is heightened in sectors with high dependency on mobile networks, such as telecommunications providers, transportation, healthcare, and public safety. Additionally, the disruption could cascade to impact supply chains and remote workforce connectivity. Since exploitation requires no user interaction and no elevated privileges, the attack surface is broad, increasing the likelihood of opportunistic attacks. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains. Organizations may also face reputational damage and regulatory scrutiny if service disruptions affect customers or critical services. Overall, the vulnerability poses a significant threat to network availability and operational continuity in Europe.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT8893 series) and verify firmware versions NR15, NR16, NR17, or NR17R. 2) Apply the official patches released by MediaTek (MOLY01689254 for NR15/NR16 and MOLY01689259 for NR17/NR17R) immediately to remediate the vulnerability. 3) Collaborate with device manufacturers and mobile network operators to ensure timely firmware updates and deployment. 4) Implement network monitoring to detect connections to suspicious or rogue base stations, leveraging anomaly detection and threat intelligence feeds. 5) Employ base station authentication and validation mechanisms where possible to reduce the risk of rogue base station attacks. 6) Educate security teams about the threat vector involving rogue base stations and prepare incident response plans for potential DoS events. 7) For critical infrastructure, consider deploying redundant communication channels or failover mechanisms to maintain connectivity during potential disruptions. 8) Engage with telecom providers to understand their mitigation strategies and ensure alignment with security best practices. These targeted actions go beyond generic advice by focusing on device inventory, patch management, network defense, and operational resilience specific to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.007Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f6d
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/2/2026, 8:49:17 AM
Last updated: 2/7/2026, 1:57:36 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.