CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.
AI Analysis
Technical Summary
CVE-2026-20421 is a medium-severity vulnerability classified as an out-of-bounds read (CWE-125) found in multiple MediaTek modem chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, and MT8791. The vulnerability exists due to improper input validation in the modem firmware, specifically in the handling of data received from the network. When a user equipment (UE) device connects to a rogue base station controlled by an attacker, crafted inputs can trigger an out-of-bounds read condition, causing the modem system to crash. This results in a denial of service (DoS) condition, disrupting the device’s communication capabilities. Notably, exploitation does not require any user interaction or elevated privileges, making it easier for attackers to execute remotely. The vulnerability affects devices running the Modem NR15 version. The CVSS v3.1 score of 6.5 reflects a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No public exploits are known at this time, but the risk remains significant due to the potential for service disruption. MediaTek has assigned a patch (MOLY01738293) to address this issue, and users are advised to update affected devices promptly. The vulnerability is particularly relevant for mobile devices and IoT equipment using these chipsets, as they rely on modem connectivity for operation.
Potential Impact
For European organizations, the primary impact of CVE-2026-20421 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, impacting business operations reliant on cellular connectivity, including IoT deployments, mobile workforce devices, and critical communication infrastructure. Service interruptions could affect sectors such as telecommunications, transportation, healthcare, and emergency services. The lack of required user interaction or privileges lowers the barrier for attackers, increasing the risk of widespread disruption if rogue base stations are deployed. While confidentiality and integrity are not directly impacted, availability degradation can lead to operational downtime and potential safety risks in critical environments. The threat is heightened in environments where devices cannot be easily patched or replaced, such as embedded systems or remote IoT nodes. Additionally, the presence of rogue base stations in urban or industrial areas could facilitate targeted attacks against specific organizations or sectors.
Mitigation Recommendations
1. Apply the official MediaTek patch MOLY01738293 as soon as it becomes available and is validated for your devices. 2. Implement network monitoring to detect and block rogue base stations, using tools capable of identifying anomalous cellular signals or unauthorized network nodes. 3. Employ device management solutions to inventory and track devices with affected MediaTek chipsets, prioritizing patch deployment and monitoring. 4. For critical infrastructure, consider deploying multi-factor communication channels or fallback connectivity options to mitigate the impact of modem outages. 5. Educate network security teams about the risk of rogue base stations and incorporate detection into security operations center (SOC) workflows. 6. Collaborate with mobile network operators to report and mitigate unauthorized base stations in your operational areas. 7. For IoT deployments, design redundancy and failover mechanisms to maintain service continuity in case of modem failure. 8. Regularly update device firmware and maintain an asset management program to ensure timely vulnerability remediation.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Poland
CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20421 is a medium-severity vulnerability classified as an out-of-bounds read (CWE-125) found in multiple MediaTek modem chipsets, including MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, and MT8791. The vulnerability exists due to improper input validation in the modem firmware, specifically in the handling of data received from the network. When a user equipment (UE) device connects to a rogue base station controlled by an attacker, crafted inputs can trigger an out-of-bounds read condition, causing the modem system to crash. This results in a denial of service (DoS) condition, disrupting the device’s communication capabilities. Notably, exploitation does not require any user interaction or elevated privileges, making it easier for attackers to execute remotely. The vulnerability affects devices running the Modem NR15 version. The CVSS v3.1 score of 6.5 reflects a medium severity with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). No public exploits are known at this time, but the risk remains significant due to the potential for service disruption. MediaTek has assigned a patch (MOLY01738293) to address this issue, and users are advised to update affected devices promptly. The vulnerability is particularly relevant for mobile devices and IoT equipment using these chipsets, as they rely on modem connectivity for operation.
Potential Impact
For European organizations, the primary impact of CVE-2026-20421 is the potential for remote denial of service on devices using affected MediaTek modems. This can disrupt mobile communications, impacting business operations reliant on cellular connectivity, including IoT deployments, mobile workforce devices, and critical communication infrastructure. Service interruptions could affect sectors such as telecommunications, transportation, healthcare, and emergency services. The lack of required user interaction or privileges lowers the barrier for attackers, increasing the risk of widespread disruption if rogue base stations are deployed. While confidentiality and integrity are not directly impacted, availability degradation can lead to operational downtime and potential safety risks in critical environments. The threat is heightened in environments where devices cannot be easily patched or replaced, such as embedded systems or remote IoT nodes. Additionally, the presence of rogue base stations in urban or industrial areas could facilitate targeted attacks against specific organizations or sectors.
Mitigation Recommendations
1. Apply the official MediaTek patch MOLY01738293 as soon as it becomes available and is validated for your devices. 2. Implement network monitoring to detect and block rogue base stations, using tools capable of identifying anomalous cellular signals or unauthorized network nodes. 3. Employ device management solutions to inventory and track devices with affected MediaTek chipsets, prioritizing patch deployment and monitoring. 4. For critical infrastructure, consider deploying multi-factor communication channels or fallback connectivity options to mitigate the impact of modem outages. 5. Educate network security teams about the risk of rogue base stations and incorporate detection into security operations center (SOC) workflows. 6. Collaborate with mobile network operators to report and mitigate unauthorized base stations in your operational areas. 7. For IoT deployments, design redundancy and failover mechanisms to maintain service continuity in case of modem failure. 8. Regularly update device firmware and maintain an asset management program to ensure timely vulnerability remediation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.010Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806094f9fa50a62f0b3fda
Added to database: 2/2/2026, 8:30:12 AM
Last enriched: 2/18/2026, 8:58:04 AM
Last updated: 3/23/2026, 11:33:41 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.