Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20403: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

0
High
VulnerabilityCVE-2026-20403cvecve-2026-20403cwe-787
Published: Mon Feb 02 2026 (02/02/2026, 08:14:45 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893

Description

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:49:17 UTC

Technical Analysis

CVE-2026-20403 is a critical security vulnerability identified in a broad range of MediaTek modem chipsets, including MT2735 through MT8893 series, specifically affecting modem firmware versions NR15, NR16, NR17, and NR17R. The vulnerability is classified as an out-of-bounds write (CWE-787) caused by a missing bounds check in the modem's codebase. This flaw allows an attacker controlling a rogue base station to send specially crafted signals that trigger a memory corruption condition, resulting in a system crash of the modem. The crash leads to a denial of service (DoS) condition on the affected device, disrupting its network connectivity. Notably, exploitation does not require any user interaction or elevated privileges on the device, making it remotely exploitable once the device connects to the malicious base station. The vulnerability affects a wide range of MediaTek chipsets commonly integrated into smartphones, IoT devices, and embedded systems. Although no public exploits have been reported, the potential impact on device availability and network reliability is significant. MediaTek has released patches identified as MOLY01689254 for NR15 and NR16, and MOLY01689259 for NR17 and NR17R modems to address this issue. The vulnerability was reserved in November 2025 and published in February 2026, indicating recent discovery and disclosure. Due to the nature of the flaw, attackers could cause widespread service disruption in cellular networks by targeting vulnerable devices connected to rogue base stations, which could be deployed in targeted attack scenarios or by malicious actors seeking to degrade network services.

Potential Impact

For European organizations, the primary impact of CVE-2026-20403 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting business operations reliant on cellular connectivity, including critical infrastructure, emergency services, and IoT deployments. The vulnerability could be exploited to cause network outages or degrade service quality by forcing devices offline when they connect to attacker-controlled rogue base stations. This risk is heightened in sectors with high dependency on mobile networks, such as telecommunications providers, transportation, healthcare, and public safety. Additionally, the disruption could cascade to impact supply chains and remote workforce connectivity. Since exploitation requires no user interaction and no elevated privileges, the attack surface is broad, increasing the likelihood of opportunistic attacks. The absence of known exploits in the wild currently limits immediate risk, but the potential for future exploitation remains. Organizations may also face reputational damage and regulatory scrutiny if service disruptions affect customers or critical services. Overall, the vulnerability poses a significant threat to network availability and operational continuity in Europe.

Mitigation Recommendations

European organizations should prioritize the following mitigation steps: 1) Identify all devices and equipment using affected MediaTek modem chipsets (MT2735 through MT8893 series) and verify firmware versions NR15, NR16, NR17, or NR17R. 2) Apply the official patches released by MediaTek (MOLY01689254 for NR15/NR16 and MOLY01689259 for NR17/NR17R) immediately to remediate the vulnerability. 3) Collaborate with device manufacturers and mobile network operators to ensure timely firmware updates and deployment. 4) Implement network monitoring to detect connections to suspicious or rogue base stations, leveraging anomaly detection and threat intelligence feeds. 5) Employ base station authentication and validation mechanisms where possible to reduce the risk of rogue base station attacks. 6) Educate security teams about the threat vector involving rogue base stations and prepare incident response plans for potential DoS events. 7) For critical infrastructure, consider deploying redundant communication channels or failover mechanisms to maintain connectivity during potential disruptions. 8) Engage with telecom providers to understand their mitigation strategies and ensure alignment with security best practices. These targeted actions go beyond generic advice by focusing on device inventory, patch management, network defense, and operational resilience specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f6d

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/2/2026, 8:49:17 AM

Last updated: 2/7/2026, 1:57:36 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats