Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

0
High
VulnerabilityCVE-2026-20420cvecve-2026-20420cwe-125
Published: Mon Feb 02 2026 (02/02/2026, 08:14:32 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

Description

In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:45:05 UTC

Technical Analysis

CVE-2026-20420 is a vulnerability classified as CWE-125 (out-of-bounds read) found in a wide range of MediaTek modem chipsets, including models MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, and MT8791. The vulnerability stems from incorrect error handling within the modem firmware, which can trigger an out-of-bounds read condition. This flaw can cause the modem system to crash, resulting in a denial of service (DoS) condition. The attack vector requires the user equipment (UE) to connect to a rogue base station controlled by an attacker, but does not require any additional execution privileges or user interaction, making exploitation feasible remotely and stealthily. Affected modem firmware versions include NR15, NR16, NR17, and NR17R. The vulnerability was publicly disclosed in early 2026, with no known exploits currently observed in the wild. The issue is significant because modems are critical components in mobile devices, and a crash can disrupt cellular connectivity, impacting voice, data, and emergency communications. The vulnerability affects a broad range of MediaTek chipsets commonly used in smartphones, IoT devices, and embedded systems. The lack of a CVSS score necessitates an assessment based on impact and exploitability factors. The vulnerability's root cause is a memory safety issue, a common and serious class of bugs that can lead to system instability or crashes. The patch status is not explicitly provided, but vendors typically release firmware updates to address such flaws. The attack requires a rogue base station, which implies a sophisticated adversary capable of setting up such infrastructure, often seen in targeted attacks or advanced persistent threats (APTs).

Potential Impact

For European organizations, the primary impact of CVE-2026-20420 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, affecting business operations reliant on cellular connectivity, including remote work, mobile payments, IoT device management, and emergency services. Telecommunications providers could see network instability or increased support costs due to affected user devices. Critical infrastructure relying on cellular networks, such as utilities or transportation systems, may experience service degradation or outages. The vulnerability could be exploited to target specific users or groups by deploying rogue base stations in strategic locations, potentially causing localized service denial. Since no user interaction or elevated privileges are required, the attack surface is broad, increasing risk for mobile users across sectors. The disruption could also undermine trust in mobile network reliability and impact compliance with regulations requiring service availability. Although no data confidentiality or integrity compromise is indicated, the availability impact alone can have cascading effects on business continuity and safety-critical applications. Organizations with large deployments of MediaTek-based devices or those operating in sensitive environments should prioritize mitigation to avoid operational disruptions.

Mitigation Recommendations

1. Apply firmware updates from MediaTek or device manufacturers as soon as patches addressing CVE-2026-20420 become available. 2. Implement network-level detection and blocking of rogue base stations using advanced radio frequency monitoring tools and anomaly detection systems. 3. Employ mobile device management (MDM) solutions to enforce timely updates and monitor device health status. 4. Educate users and IT staff about the risks of connecting to untrusted cellular networks and encourage the use of VPNs or secure communication channels where possible. 5. Collaborate with mobile network operators to enhance base station authentication and integrity verification mechanisms to reduce rogue base station risks. 6. For critical infrastructure, consider multi-path communication strategies that do not rely solely on cellular connectivity to maintain availability. 7. Monitor security advisories from MediaTek and related vendors for updates and additional mitigation guidance. 8. Conduct penetration testing and red team exercises simulating rogue base station attacks to assess organizational resilience. 9. Restrict physical access to areas where rogue base stations could be deployed and increase surveillance in sensitive locations. 10. Integrate modem vulnerability scanning into regular security assessments of mobile and IoT devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fd7

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 2/2/2026, 8:45:05 AM

Last updated: 2/7/2026, 12:34:40 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats