CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MediaTek chipset
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.
AI Analysis
Technical Summary
CVE-2026-20405 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem component of MediaTek chipsets. The root cause is a missing bounds check in the modem firmware, which leads to an assertion failure that can crash the system. This vulnerability can be triggered remotely by an attacker who operates a rogue base station, causing connected user equipment (UE) to experience a denial of service (DoS) condition. Exploitation does not require any privileges or user interaction, making it relatively easy to exploit in environments where attackers can simulate or control base stations. The affected chipsets include a broad range of MediaTek models (MT2735 through MT8893 series), which are widely used in mobile phones and IoT devices globally. The impact is limited to availability, as confidentiality and integrity are not affected. MediaTek has issued a patch (MOLY01688495) to address this issue. While no active exploits have been reported, the potential for disruption in mobile communications is significant, especially in areas where rogue base stations can be deployed. The vulnerability was publicly disclosed in early 2026, with a CVSS v3.1 base score of 6.5, reflecting medium severity due to its remote exploitability and impact on availability.
Potential Impact
The primary impact of CVE-2026-20405 is a remote denial of service on devices using affected MediaTek chipsets. This can disrupt mobile communications by crashing the modem firmware, potentially causing devices to lose network connectivity or require rebooting. For end-users, this results in service interruptions, degraded user experience, and possible loss of critical communications. For organizations, especially telecom operators, mobile device manufacturers, and enterprises relying on mobile connectivity, this vulnerability could lead to service outages, customer dissatisfaction, and increased support costs. In critical infrastructure or emergency services relying on mobile networks, such disruptions could have severe operational consequences. The ease of exploitation without authentication or user interaction increases the risk, particularly in environments where attackers can deploy rogue base stations, such as public spaces, urban areas, or targeted locations. However, since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a concern here. The broad range of affected chipset models amplifies the potential scope of impact worldwide.
Mitigation Recommendations
To mitigate CVE-2026-20405, organizations and device manufacturers should promptly apply the official patch MOLY01688495 provided by MediaTek. Mobile device vendors should coordinate firmware updates and distribute them to end-users as soon as possible. Network operators can implement detection and mitigation strategies against rogue base stations, such as enhanced base station authentication, anomaly detection systems, and user alerts for suspicious network behavior. Enterprises should educate users about the risks of connecting to untrusted networks and encourage the use of trusted carriers. For IoT deployments using affected chipsets, firmware updates should be prioritized and tested for stability. Additionally, monitoring device logs for modem crashes or unusual disconnections can help identify potential exploitation attempts. Network segmentation and limiting device exposure to untrusted radio environments can reduce attack surface. Finally, collaboration between telecom providers, device manufacturers, and security researchers is essential to monitor for emerging exploits and develop further protective measures.
Affected Countries
United States, China, India, South Korea, Japan, Germany, United Kingdom, Brazil, Russia, France, Italy, Canada, Australia, Vietnam, Indonesia
CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MediaTek chipset
Description
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20405 is a vulnerability classified under CWE-617 (Reachable Assertion) found in the modem component of MediaTek chipsets. The root cause is a missing bounds check in the modem firmware, which leads to an assertion failure that can crash the system. This vulnerability can be triggered remotely by an attacker who operates a rogue base station, causing connected user equipment (UE) to experience a denial of service (DoS) condition. Exploitation does not require any privileges or user interaction, making it relatively easy to exploit in environments where attackers can simulate or control base stations. The affected chipsets include a broad range of MediaTek models (MT2735 through MT8893 series), which are widely used in mobile phones and IoT devices globally. The impact is limited to availability, as confidentiality and integrity are not affected. MediaTek has issued a patch (MOLY01688495) to address this issue. While no active exploits have been reported, the potential for disruption in mobile communications is significant, especially in areas where rogue base stations can be deployed. The vulnerability was publicly disclosed in early 2026, with a CVSS v3.1 base score of 6.5, reflecting medium severity due to its remote exploitability and impact on availability.
Potential Impact
The primary impact of CVE-2026-20405 is a remote denial of service on devices using affected MediaTek chipsets. This can disrupt mobile communications by crashing the modem firmware, potentially causing devices to lose network connectivity or require rebooting. For end-users, this results in service interruptions, degraded user experience, and possible loss of critical communications. For organizations, especially telecom operators, mobile device manufacturers, and enterprises relying on mobile connectivity, this vulnerability could lead to service outages, customer dissatisfaction, and increased support costs. In critical infrastructure or emergency services relying on mobile networks, such disruptions could have severe operational consequences. The ease of exploitation without authentication or user interaction increases the risk, particularly in environments where attackers can deploy rogue base stations, such as public spaces, urban areas, or targeted locations. However, since the vulnerability does not affect confidentiality or integrity, data theft or manipulation is not a concern here. The broad range of affected chipset models amplifies the potential scope of impact worldwide.
Mitigation Recommendations
To mitigate CVE-2026-20405, organizations and device manufacturers should promptly apply the official patch MOLY01688495 provided by MediaTek. Mobile device vendors should coordinate firmware updates and distribute them to end-users as soon as possible. Network operators can implement detection and mitigation strategies against rogue base stations, such as enhanced base station authentication, anomaly detection systems, and user alerts for suspicious network behavior. Enterprises should educate users about the risks of connecting to untrusted networks and encourage the use of trusted carriers. For IoT deployments using affected chipsets, firmware updates should be prioritized and tested for stability. Additionally, monitoring device logs for modem crashes or unusual disconnections can help identify potential exploitation attempts. Network segmentation and limiting device exposure to untrusted radio environments can reduce attack surface. Finally, collaboration between telecom providers, device manufacturers, and security researchers is essential to monitor for emerging exploits and develop further protective measures.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.007Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f73
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 3/30/2026, 7:31:17 PM
Last updated: 5/8/2026, 4:34:36 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.