CVE-2026-20403: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.
AI Analysis
Technical Summary
CVE-2026-20403 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, and MT8893. The vulnerability stems from a missing bounds check in the modem firmware's handling of certain inputs, which can lead to an out-of-bounds write condition. This flaw can cause the modem system to crash, resulting in a denial of service condition. The attack vector requires that the user equipment (UE) connects to a rogue base station controlled by an attacker, but no additional privileges or user interaction are necessary, making exploitation relatively straightforward in a targeted environment. The affected modem versions include NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 6.5, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). MediaTek has released patches identified as MOLY01689254 and MOLY01689259 to address this issue. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily threatens the availability of devices using these modems, potentially disrupting mobile communications or connected services relying on these chipsets.
Potential Impact
For European organizations, the primary impact of CVE-2026-20403 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, IoT devices, and critical infrastructure relying on cellular connectivity. Telecommunications providers using equipment with these chipsets could face service outages or degraded network performance if attackers deploy rogue base stations to exploit this flaw. Enterprises relying on mobile broadband for operations or remote connectivity may experience interruptions, impacting business continuity. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing risk in environments where rogue base stations can be deployed, such as urban areas or near critical infrastructure. While confidentiality and integrity are not directly impacted, availability degradation can have cascading effects on operational technology, emergency services, and customer-facing applications. The absence of known exploits provides a window for proactive patching, but the widespread use of MediaTek modems in consumer and industrial devices means the attack surface is significant.
Mitigation Recommendations
Organizations should prioritize applying the patches released by MediaTek (MOLY01689254 for NR15/NR16 and MOLY01689259 for NR17/NR17R) as soon as possible to eliminate the vulnerability. Network operators should monitor for rogue base stations and implement detection mechanisms such as anomaly-based intrusion detection systems and radio frequency monitoring to identify unauthorized cellular infrastructure. Deploying network access control and authentication mechanisms can reduce the risk of devices connecting to malicious base stations. Device manufacturers and integrators should ensure firmware updates are distributed promptly to end users and embedded device operators. For critical infrastructure, consider deploying redundant communication paths and failover mechanisms to maintain availability in case of modem failure. Security teams should also educate users about the risks of connecting to unknown or suspicious networks and implement policies restricting connections to trusted cellular networks. Continuous monitoring of device health and connectivity status can help detect early signs of exploitation or service degradation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2026-20403: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893
Description
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20403 is a vulnerability classified under CWE-787 (Out-of-bounds Write) affecting a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, and MT8893. The vulnerability stems from a missing bounds check in the modem firmware's handling of certain inputs, which can lead to an out-of-bounds write condition. This flaw can cause the modem system to crash, resulting in a denial of service condition. The attack vector requires that the user equipment (UE) connects to a rogue base station controlled by an attacker, but no additional privileges or user interaction are necessary, making exploitation relatively straightforward in a targeted environment. The affected modem versions include NR15, NR16, NR17, and NR17R. The CVSS v3.1 base score is 6.5, reflecting a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). MediaTek has released patches identified as MOLY01689254 and MOLY01689259 to address this issue. No known exploits have been reported in the wild as of the publication date. The vulnerability primarily threatens the availability of devices using these modems, potentially disrupting mobile communications or connected services relying on these chipsets.
Potential Impact
For European organizations, the primary impact of CVE-2026-20403 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, IoT devices, and critical infrastructure relying on cellular connectivity. Telecommunications providers using equipment with these chipsets could face service outages or degraded network performance if attackers deploy rogue base stations to exploit this flaw. Enterprises relying on mobile broadband for operations or remote connectivity may experience interruptions, impacting business continuity. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing risk in environments where rogue base stations can be deployed, such as urban areas or near critical infrastructure. While confidentiality and integrity are not directly impacted, availability degradation can have cascading effects on operational technology, emergency services, and customer-facing applications. The absence of known exploits provides a window for proactive patching, but the widespread use of MediaTek modems in consumer and industrial devices means the attack surface is significant.
Mitigation Recommendations
Organizations should prioritize applying the patches released by MediaTek (MOLY01689254 for NR15/NR16 and MOLY01689259 for NR17/NR17R) as soon as possible to eliminate the vulnerability. Network operators should monitor for rogue base stations and implement detection mechanisms such as anomaly-based intrusion detection systems and radio frequency monitoring to identify unauthorized cellular infrastructure. Deploying network access control and authentication mechanisms can reduce the risk of devices connecting to malicious base stations. Device manufacturers and integrators should ensure firmware updates are distributed promptly to end users and embedded device operators. For critical infrastructure, consider deploying redundant communication paths and failover mechanisms to maintain availability in case of modem failure. Security teams should also educate users about the risks of connecting to unknown or suspicious networks and implement policies restricting connections to trusted cellular networks. Continuous monitoring of device health and connectivity status can help detect early signs of exploitation or service degradation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.007Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f6d
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/18/2026, 8:56:39 AM
Last updated: 3/25/2026, 3:10:28 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.