Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2026-20405cvecve-2026-20405cwe-617
Published: Mon Feb 02 2026 (02/02/2026, 08:14:50 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:57:12 UTC

Technical Analysis

CVE-2026-20405 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem firmware of a broad range of MediaTek chipsets, including MT2735 through MT8893 series. The root cause is a missing bounds check in the modem software, which leads to a reachable assertion failure. When a user equipment (UE) device equipped with one of these affected chipsets connects to a rogue base station controlled by an attacker, the attacker can remotely trigger a system crash, causing a denial of service (DoS). This attack vector does not require any user interaction or elevated privileges, making it easier to exploit in scenarios where the attacker can simulate or control a base station environment. The affected modem versions include NR15, NR16, NR17, and NR17R, which are commonly integrated into mobile devices and IoT equipment. The vulnerability impacts the availability of the device by causing crashes, but does not affect confidentiality or integrity. The CVSS v3.1 score is 6.5, indicating a medium severity level, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). No known exploits have been reported in the wild as of the publication date. The vendor has assigned a patch ID (MOLY01688495) and issue ID (MSV-4818), but no public patch links are currently available. This vulnerability highlights the risks posed by rogue base stations and the importance of robust modem firmware validation and bounds checking.

Potential Impact

For European organizations, the primary impact of CVE-2026-20405 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, impacting business operations, especially in sectors reliant on mobile connectivity such as telecommunications providers, emergency services, transportation, and critical infrastructure. The vulnerability could be exploited in targeted attacks where adversaries deploy rogue base stations to cause service outages or degrade network reliability. Although it does not compromise data confidentiality or integrity, the availability impact can lead to operational downtime and loss of productivity. Enterprises deploying IoT devices or mobile endpoints with these chipsets may experience device instability or failure, complicating incident response and recovery. The lack of user interaction and no privilege requirements lower the barrier for exploitation in environments where attackers can position rogue base stations, such as public spaces or near corporate premises. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as rogue base station technology becomes more accessible.

Mitigation Recommendations

1. Apply vendor-provided patches immediately once available to address the missing bounds check in the modem firmware. 2. Implement network monitoring solutions capable of detecting and alerting on rogue base station activity, including unusual base station identifiers or signal characteristics. 3. Employ mobile device management (MDM) policies to restrict connections to trusted networks and enforce firmware updates on devices using affected chipsets. 4. Use endpoint security solutions that can monitor modem behavior and detect abnormal crashes or resets indicative of exploitation attempts. 5. Educate users and administrators about the risks of rogue base stations and encourage reporting of suspicious network behavior. 6. Collaborate with telecom providers to enhance detection and mitigation of unauthorized base stations within organizational vicinities. 7. For critical infrastructure, consider deploying redundant communication paths or failover mechanisms to maintain availability in case of targeted DoS attacks. 8. Regularly audit and inventory devices to identify those using vulnerable MediaTek chipsets and prioritize them for remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f73

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/18/2026, 8:57:12 AM

Last updated: 3/24/2026, 10:17:24 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses