Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20406: CWE-770 Allocation of Resources Without Limits or Throttling in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2026-20406cvecve-2026-20406cwe-770
Published: Mon Feb 02 2026 (02/02/2026, 08:14:52 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01726634; Issue ID: MSV-5728.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:48:29 UTC

Technical Analysis

CVE-2026-20406 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting a wide range of MediaTek modem chipsets, including models MT2735 through MT8893. The issue arises in the modem's handling of resource allocation, where an uncaught exception can cause the system to crash. This vulnerability can be exploited remotely by an attacker who controls a rogue base station to which a user equipment (UE) device connects. The attack does not require any additional execution privileges or user interaction, making it easier to exploit in practice. The consequence of exploitation is a denial of service (DoS) condition on the affected device, potentially disrupting network connectivity and communications. The affected modem versions include NR15, NR16, NR17, and NR17R. Although no exploits have been reported in the wild, the vulnerability's nature suggests it could be leveraged in targeted attacks against mobile devices or infrastructure relying on these chipsets. The vulnerability was reserved in November 2025 and published in February 2026. While a patch ID (MOLY01726634) and issue ID (MSV-5728) are referenced, no direct patch links are provided in the data. The broad range of affected chipsets indicates a widespread impact across many devices using MediaTek modems, which are common in smartphones, IoT devices, and embedded systems. The vulnerability primarily impacts the availability of affected devices by causing system crashes, which could disrupt user communications and services relying on these modems.

Potential Impact

For European organizations, this vulnerability poses a significant risk to mobile communications and connected infrastructure that utilize MediaTek modem chipsets. The potential for remote denial of service without user interaction or elevated privileges means attackers could disrupt critical communications, affecting enterprises, emergency services, and telecom operators. Disruptions could impact mobile workforce connectivity, IoT deployments, and any service relying on stable cellular connections. The risk is heightened in environments where rogue base stations could be deployed or exist, such as in urban areas, transport hubs, or near sensitive facilities. The widespread use of MediaTek chipsets in consumer and industrial devices across Europe means the attack surface is large. While no exploits are currently known in the wild, the vulnerability could be leveraged in espionage, sabotage, or disruption campaigns, especially given geopolitical tensions. The impact on confidentiality and integrity is limited, but availability degradation could have cascading effects on business operations and public safety communications.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Identify and inventory all devices using affected MediaTek modem chipsets, including smartphones, IoT devices, and embedded systems. 2) Apply vendor-provided patches or firmware updates as soon as they become available, referencing the patch ID MOLY01726634 and issue ID MSV-5728. 3) Implement network monitoring to detect and block rogue base stations or suspicious cellular network behavior using IMSI catchers or similar detection tools. 4) Employ mobile device management (MDM) solutions to enforce timely updates and restrict connections to untrusted networks. 5) Educate users and administrators about the risks of connecting to unknown cellular networks, especially in sensitive or high-risk locations. 6) Collaborate with telecom providers to enhance detection and mitigation of rogue base stations within organizational environments. 7) For critical infrastructure, consider fallback communication methods or redundancy to maintain availability during potential disruptions. These steps go beyond generic advice by focusing on proactive detection of rogue base stations and strict update management tailored to the affected modem chipsets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.007Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806092f9fa50a62f0b3f76

Added to database: 2/2/2026, 8:30:10 AM

Last enriched: 2/2/2026, 8:48:29 AM

Last updated: 2/7/2026, 6:10:58 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats