Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2026-20405cvecve-2026-20405cwe-617
Published: Mon Feb 02 2026 (02/02/2026, 08:14:50 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:48:45 UTC

Technical Analysis

CVE-2026-20405 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem firmware versions NR15 through NR17R. The root cause is a missing bounds check in the modem’s code, leading to a reachable assertion failure (CWE-617). This flaw can be exploited remotely by an attacker who operates a rogue base station that a user equipment (UE) connects to, causing the modem to crash and resulting in a denial of service condition. No user interaction or elevated privileges are required, making exploitation straightforward once the UE connects to the malicious base station. The vulnerability impacts the modem’s stability and availability, potentially disrupting mobile communications on affected devices. MediaTek has acknowledged the issue and assigned internal patch IDs (MOLY01688495, MSV-4818), though no public patch links are provided yet. There are no known exploits in the wild at this time, but the broad range of affected chipsets and the nature of the vulnerability pose a significant risk. The vulnerability is particularly concerning for mobile devices used in critical infrastructure or enterprise environments where communication reliability is paramount. The lack of a CVSS score necessitates an independent severity assessment based on the technical details and potential impact.

Potential Impact

For European organizations, the primary impact of CVE-2026-20405 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This could disrupt mobile communications, affecting business operations, emergency services, and critical infrastructure relying on cellular connectivity. Enterprises with mobile workforces or IoT deployments using these chipsets may experience outages or degraded service. The vulnerability could also be exploited to target specific users or groups by deploying rogue base stations in strategic locations, leading to localized communication blackouts. Telecommunications providers and mobile network operators in Europe could face increased support costs and reputational damage if large numbers of subscribers are affected. Additionally, sectors such as transportation, healthcare, and public safety that depend on reliable mobile connectivity might see operational risks. The absence of required user interaction and the ease of triggering the vulnerability increase the threat level. However, the lack of known active exploits and the need for proximity to the victim device (to operate a rogue base station) somewhat limit the attack scope.

Mitigation Recommendations

European organizations should prioritize the following mitigations: 1) Work closely with device manufacturers and vendors to ensure timely application of firmware updates and patches once publicly available from MediaTek or device OEMs. 2) Deploy network-level defenses to detect and block rogue base stations, including monitoring for anomalous base station behavior and using SIM-based or network-assisted detection mechanisms. 3) Educate users and IT staff about the risks of connecting to untrusted cellular networks, especially in high-risk or sensitive environments. 4) For critical infrastructure, consider multi-factor communication channels or fallback options to maintain connectivity if mobile networks are disrupted. 5) Collaborate with mobile network operators to enhance network authentication and integrity checks to prevent rogue base station attacks. 6) Implement device-level monitoring to detect abnormal modem behavior or frequent disconnections that may indicate exploitation attempts. 7) Maintain an inventory of devices using affected MediaTek chipsets to assess exposure and prioritize remediation efforts. These steps go beyond generic advice by focusing on both patch management and proactive network security controls tailored to the nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f73

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/2/2026, 8:48:45 AM

Last updated: 2/5/2026, 1:37:57 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats