CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.
AI Analysis
Technical Summary
CVE-2026-20422 is a security vulnerability classified under CWE-617 (Reachable Assertion) affecting numerous MediaTek modem chipsets including MT2735, MT2737, MT6813, MT6815, and many others used in mobile devices. The vulnerability stems from improper input validation in the modem firmware, which can be triggered when a user equipment (UE) connects to a malicious or rogue base station controlled by an attacker. This causes the modem to hit an assertion failure, leading to a system crash and resulting in a denial of service (DoS) condition. The attack vector is remote and does not require any user interaction or elevated privileges, making it easier to exploit in the wild. The affected modem versions include NR15, NR16, NR17, and NR17R. Although no exploits have been reported publicly yet, the vulnerability could be leveraged to disrupt mobile device connectivity and availability. MediaTek has assigned patch ID MOLY00827332 to address this issue. The broad range of affected chipsets indicates a wide potential impact across many mobile devices globally. The vulnerability primarily threatens the availability of devices by causing crashes, which could impact communications, especially in environments relying heavily on mobile connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2026-20422 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This could disrupt mobile communications, affecting business operations, especially for sectors dependent on mobile networks such as telecommunications providers, emergency services, and critical infrastructure operators. The vulnerability could be exploited by attackers setting up rogue base stations to target specific users or groups, causing device crashes without requiring user interaction. This may lead to service outages, loss of connectivity, and operational disruptions. Additionally, organizations relying on mobile IoT devices or remote monitoring systems using these chipsets could experience degraded service or failure. The widespread use of MediaTek chipsets in consumer and enterprise mobile devices across Europe increases the risk of broad impact. The lack of required authentication or user action lowers the barrier for exploitation, raising concerns about potential targeted or opportunistic attacks.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Ensure all devices using affected MediaTek modem chipsets are updated with the latest firmware patches from MediaTek, specifically patch MOLY00827332 or later versions that address this vulnerability. 2) Collaborate with mobile network operators to detect and mitigate rogue base stations within their coverage areas, employing network monitoring and anomaly detection tools. 3) Implement device-level monitoring to detect unexpected modem crashes or connectivity issues that may indicate exploitation attempts. 4) For critical infrastructure and enterprise environments, consider deploying mobile threat defense solutions that can identify suspicious network behavior. 5) Educate users about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels where feasible. 6) Engage with device manufacturers and service providers to verify patch deployment status and request updates if necessary. 7) Maintain incident response plans that include scenarios involving mobile device denial of service to minimize operational impact.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Finland
CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.
AI-Powered Analysis
Technical Analysis
CVE-2026-20422 is a security vulnerability classified under CWE-617 (Reachable Assertion) affecting numerous MediaTek modem chipsets including MT2735, MT2737, MT6813, MT6815, and many others used in mobile devices. The vulnerability stems from improper input validation in the modem firmware, which can be triggered when a user equipment (UE) connects to a malicious or rogue base station controlled by an attacker. This causes the modem to hit an assertion failure, leading to a system crash and resulting in a denial of service (DoS) condition. The attack vector is remote and does not require any user interaction or elevated privileges, making it easier to exploit in the wild. The affected modem versions include NR15, NR16, NR17, and NR17R. Although no exploits have been reported publicly yet, the vulnerability could be leveraged to disrupt mobile device connectivity and availability. MediaTek has assigned patch ID MOLY00827332 to address this issue. The broad range of affected chipsets indicates a wide potential impact across many mobile devices globally. The vulnerability primarily threatens the availability of devices by causing crashes, which could impact communications, especially in environments relying heavily on mobile connectivity.
Potential Impact
For European organizations, the primary impact of CVE-2026-20422 is the potential for remote denial of service on devices using affected MediaTek modem chipsets. This could disrupt mobile communications, affecting business operations, especially for sectors dependent on mobile networks such as telecommunications providers, emergency services, and critical infrastructure operators. The vulnerability could be exploited by attackers setting up rogue base stations to target specific users or groups, causing device crashes without requiring user interaction. This may lead to service outages, loss of connectivity, and operational disruptions. Additionally, organizations relying on mobile IoT devices or remote monitoring systems using these chipsets could experience degraded service or failure. The widespread use of MediaTek chipsets in consumer and enterprise mobile devices across Europe increases the risk of broad impact. The lack of required authentication or user action lowers the barrier for exploitation, raising concerns about potential targeted or opportunistic attacks.
Mitigation Recommendations
European organizations should prioritize the following mitigation steps: 1) Ensure all devices using affected MediaTek modem chipsets are updated with the latest firmware patches from MediaTek, specifically patch MOLY00827332 or later versions that address this vulnerability. 2) Collaborate with mobile network operators to detect and mitigate rogue base stations within their coverage areas, employing network monitoring and anomaly detection tools. 3) Implement device-level monitoring to detect unexpected modem crashes or connectivity issues that may indicate exploitation attempts. 4) For critical infrastructure and enterprise environments, consider deploying mobile threat defense solutions that can identify suspicious network behavior. 5) Educate users about the risks of connecting to untrusted networks and encourage the use of VPNs or secure communication channels where feasible. 6) Engage with device manufacturers and service providers to verify patch deployment status and request updates if necessary. 7) Maintain incident response plans that include scenarios involving mobile device denial of service to minimize operational impact.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.010Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806096f9fa50a62f0b42d1
Added to database: 2/2/2026, 8:30:14 AM
Last enriched: 2/2/2026, 8:44:28 AM
Last updated: 2/7/2026, 2:08:24 AM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.