CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.
AI Analysis
Technical Summary
CVE-2026-20405 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem firmware versions NR15 through NR17R. The root cause is a missing bounds check in the modem’s code, leading to a reachable assertion failure (CWE-617). This flaw can be exploited remotely by an attacker who operates a rogue base station that a user equipment (UE) connects to, causing the modem to crash and resulting in a denial of service condition. No user interaction or elevated privileges are required, making exploitation straightforward once the UE connects to the malicious base station. The vulnerability impacts the modem’s stability and availability, potentially disrupting mobile communications on affected devices. MediaTek has acknowledged the issue and assigned internal patch IDs (MOLY01688495, MSV-4818), though no public patch links are provided yet. There are no known exploits in the wild at this time, but the broad range of affected chipsets and the nature of the vulnerability pose a significant risk. The vulnerability is particularly concerning for mobile devices used in critical infrastructure or enterprise environments where communication reliability is paramount. The lack of a CVSS score necessitates an independent severity assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2026-20405 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This could disrupt mobile communications, affecting business operations, emergency services, and critical infrastructure relying on cellular connectivity. Enterprises with mobile workforces or IoT deployments using these chipsets may experience outages or degraded service. The vulnerability could also be exploited to target specific users or groups by deploying rogue base stations in strategic locations, leading to localized communication blackouts. Telecommunications providers and mobile network operators in Europe could face increased support costs and reputational damage if large numbers of subscribers are affected. Additionally, sectors such as transportation, healthcare, and public safety that depend on reliable mobile connectivity might see operational risks. The absence of required user interaction and the ease of triggering the vulnerability increase the threat level. However, the lack of known active exploits and the need for proximity to the victim device (to operate a rogue base station) somewhat limit the attack scope.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Work closely with device manufacturers and vendors to ensure timely application of firmware updates and patches once publicly available from MediaTek or device OEMs. 2) Deploy network-level defenses to detect and block rogue base stations, including monitoring for anomalous base station behavior and using SIM-based or network-assisted detection mechanisms. 3) Educate users and IT staff about the risks of connecting to untrusted cellular networks, especially in high-risk or sensitive environments. 4) For critical infrastructure, consider multi-factor communication channels or fallback options to maintain connectivity if mobile networks are disrupted. 5) Collaborate with mobile network operators to enhance network authentication and integrity checks to prevent rogue base station attacks. 6) Implement device-level monitoring to detect abnormal modem behavior or frequent disconnections that may indicate exploitation attempts. 7) Maintain an inventory of devices using affected MediaTek chipsets to assess exposure and prioritize remediation efforts. These steps go beyond generic advice by focusing on both patch management and proactive network security controls tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-20405: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01688495; Issue ID: MSV-4818.
AI-Powered Analysis
Technical Analysis
CVE-2026-20405 is a security vulnerability identified in multiple MediaTek modem chipsets, including models MT2735 through MT8893, affecting modem firmware versions NR15 through NR17R. The root cause is a missing bounds check in the modem’s code, leading to a reachable assertion failure (CWE-617). This flaw can be exploited remotely by an attacker who operates a rogue base station that a user equipment (UE) connects to, causing the modem to crash and resulting in a denial of service condition. No user interaction or elevated privileges are required, making exploitation straightforward once the UE connects to the malicious base station. The vulnerability impacts the modem’s stability and availability, potentially disrupting mobile communications on affected devices. MediaTek has acknowledged the issue and assigned internal patch IDs (MOLY01688495, MSV-4818), though no public patch links are provided yet. There are no known exploits in the wild at this time, but the broad range of affected chipsets and the nature of the vulnerability pose a significant risk. The vulnerability is particularly concerning for mobile devices used in critical infrastructure or enterprise environments where communication reliability is paramount. The lack of a CVSS score necessitates an independent severity assessment based on the technical details and potential impact.
Potential Impact
For European organizations, the primary impact of CVE-2026-20405 is the potential for remote denial of service on mobile devices and embedded systems using affected MediaTek modems. This could disrupt mobile communications, affecting business operations, emergency services, and critical infrastructure relying on cellular connectivity. Enterprises with mobile workforces or IoT deployments using these chipsets may experience outages or degraded service. The vulnerability could also be exploited to target specific users or groups by deploying rogue base stations in strategic locations, leading to localized communication blackouts. Telecommunications providers and mobile network operators in Europe could face increased support costs and reputational damage if large numbers of subscribers are affected. Additionally, sectors such as transportation, healthcare, and public safety that depend on reliable mobile connectivity might see operational risks. The absence of required user interaction and the ease of triggering the vulnerability increase the threat level. However, the lack of known active exploits and the need for proximity to the victim device (to operate a rogue base station) somewhat limit the attack scope.
Mitigation Recommendations
European organizations should prioritize the following mitigations: 1) Work closely with device manufacturers and vendors to ensure timely application of firmware updates and patches once publicly available from MediaTek or device OEMs. 2) Deploy network-level defenses to detect and block rogue base stations, including monitoring for anomalous base station behavior and using SIM-based or network-assisted detection mechanisms. 3) Educate users and IT staff about the risks of connecting to untrusted cellular networks, especially in high-risk or sensitive environments. 4) For critical infrastructure, consider multi-factor communication channels or fallback options to maintain connectivity if mobile networks are disrupted. 5) Collaborate with mobile network operators to enhance network authentication and integrity checks to prevent rogue base station attacks. 6) Implement device-level monitoring to detect abnormal modem behavior or frequent disconnections that may indicate exploitation attempts. 7) Maintain an inventory of devices using affected MediaTek chipsets to assess exposure and prioritize remediation efforts. These steps go beyond generic advice by focusing on both patch management and proactive network security controls tailored to the nature of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.007Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806092f9fa50a62f0b3f73
Added to database: 2/2/2026, 8:30:10 AM
Last enriched: 2/2/2026, 8:48:45 AM
Last updated: 2/5/2026, 1:37:57 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1517: SQL Injection in iomad
MediumCVE-2026-23572: CWE-863 Incorrect Authorization in TeamViewer Remote
HighCVE-2026-1966: CWE-522 Insufficiently Protected Credentials in YugabyteDB Inc YugabyteDB Anywhere
LowCVE-2026-23797: CWE-256 Plaintext Storage of a Password in OpenSolution Quick.Cart
MediumCVE-2026-23796: CWE-384 Session Fixation in OpenSolution Quick.Cart
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.