Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

0
High
VulnerabilityCVE-2026-20421cvecve-2026-20421cwe-125
Published: Mon Feb 02 2026 (02/02/2026, 08:14:41 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.

AI-Powered Analysis

AILast updated: 02/02/2026, 08:44:44 UTC

Technical Analysis

CVE-2026-20421 is a security vulnerability classified as CWE-125 (out-of-bounds read) affecting multiple MediaTek modem chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, and MT8791. The flaw exists in the modem firmware (Modem NR15) where improper input validation allows an attacker controlling a rogue base station to send malformed inputs to the modem, triggering an out-of-bounds read. This leads to a system crash, effectively causing a remote denial of service (DoS) on the affected device. Exploitation does not require any user interaction or elevated privileges, making it easier for attackers to execute once a UE connects to a malicious base station. The vulnerability was reserved in November 2025 and published in February 2026, with no CVSS score assigned yet. MediaTek has issued a patch identified as MOLY01738293 to address this issue. Although no exploits are known in the wild, the vulnerability poses a significant risk to devices relying on these chipsets, especially in environments where rogue base stations can be deployed, such as public spaces or targeted attacks. The vulnerability impacts the availability of affected devices by causing crashes, potentially disrupting communications and services relying on these modems.

Potential Impact

For European organizations, the primary impact of CVE-2026-20421 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This can disrupt mobile communications, impacting critical business operations, especially for sectors relying on mobile connectivity such as telecommunications providers, emergency services, and IoT deployments. The vulnerability could be exploited by attackers deploying rogue base stations in public or private areas to target specific users or groups, causing service outages without requiring user interaction or elevated privileges. This could lead to operational downtime, loss of connectivity, and potential cascading effects on dependent systems. Additionally, the presence of this vulnerability may undermine trust in mobile infrastructure security and complicate compliance with European cybersecurity regulations. While no data confidentiality or integrity compromise is indicated, the availability impact alone can be significant for organizations with high dependency on mobile networks.

Mitigation Recommendations

1. Apply the official MediaTek patch MOLY01738293 as soon as it becomes available from device manufacturers or vendors to remediate the vulnerability in the modem firmware. 2. Network operators and enterprises should implement detection and mitigation mechanisms for rogue base stations, such as monitoring for suspicious base station identifiers and signal anomalies. 3. Employ network access control policies that restrict connections to trusted base stations where feasible. 4. For critical infrastructure, consider deploying multi-factor communication channels or fallback connectivity options to maintain service continuity in case of mobile network disruptions. 5. Encourage device manufacturers and service providers to update firmware promptly and communicate the importance of patching to end users. 6. Conduct regular security assessments of mobile network environments to identify potential attack vectors involving rogue base stations. 7. Educate users and administrators about the risks of connecting to untrusted networks and the signs of potential network manipulation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806094f9fa50a62f0b3fda

Added to database: 2/2/2026, 8:30:12 AM

Last enriched: 2/2/2026, 8:44:44 AM

Last updated: 2/7/2026, 12:28:01 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats