Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20404: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2026-20404cvecve-2026-20404cwe-787
Published: Mon Feb 02 2026 (02/02/2026, 08:14:48 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689248; Issue ID: MSV-4837.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:49:00 UTC

Technical Analysis

CVE-2026-20404 is a critical vulnerability classified under CWE-787 (Out-of-bounds Write) affecting numerous MediaTek modem chipsets, including models MT2735 through MT8893. The vulnerability stems from improper input validation within the modem firmware, which can be triggered remotely when a user equipment (UE) connects to a maliciously controlled rogue base station. This rogue base station can send crafted inputs that cause the modem to perform out-of-bounds memory writes, leading to a system crash and resulting in a denial of service condition. The attack vector does not require any user interaction or elevated privileges, making it feasible for attackers to disrupt service silently and remotely. The affected modem versions include NR15, NR16, NR17, and NR17R, which are commonly embedded in mobile devices and IoT equipment. Although no public exploits have been reported yet, the vulnerability's nature and broad chipset coverage pose a significant risk. The patch has been identified (MOLY01689248), but no direct patch links are provided. This vulnerability primarily threatens the availability of affected devices, potentially causing network outages or degraded service quality. The broad range of affected chipsets indicates a widespread impact across various device manufacturers using MediaTek modems.

Potential Impact

For European organizations, the primary impact of CVE-2026-20404 is the potential for remote denial of service attacks against devices using vulnerable MediaTek modems. Telecommunications providers, IoT device manufacturers, and enterprises relying on mobile connectivity could experience service disruptions, affecting business continuity and operational reliability. Critical infrastructure relying on cellular connectivity, such as smart grids, transportation systems, and emergency services, may face increased risk of outages or degraded performance. The lack of required user interaction and the ability to exploit via rogue base stations make this vulnerability particularly dangerous in dense urban environments where attackers could deploy such stations covertly. Additionally, the disruption could lead to reputational damage and regulatory scrutiny under European data protection and network security laws. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe amplifies the potential scope of impact.

Mitigation Recommendations

To mitigate CVE-2026-20404, European organizations should prioritize the following actions: 1) Coordinate with device manufacturers and vendors to obtain and deploy the official firmware patches (MOLY01689248) for all affected MediaTek modem chipsets as soon as they become available. 2) Implement network-level defenses to detect and block rogue base stations, including the use of radio frequency monitoring tools and anomaly detection systems within cellular networks. 3) Employ device-level security controls such as modem firmware integrity verification and secure boot mechanisms to prevent unauthorized firmware modifications. 4) For critical infrastructure, consider deploying redundant communication paths and failover mechanisms to maintain service availability during potential attacks. 5) Educate network operations teams about the threat of rogue base stations and establish incident response procedures to quickly isolate and remediate affected devices. 6) Collaborate with mobile network operators to enhance base station authentication and validation protocols to reduce the risk of rogue station exploitation. These targeted measures go beyond generic patching by addressing the attack vector and operational resilience.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f70

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/2/2026, 8:49:00 AM

Last updated: 2/5/2026, 7:17:03 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats