Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
Medium
VulnerabilityCVE-2026-20422cvecve-2026-20422cwe-617
Published: Mon Feb 02 2026 (02/02/2026, 08:14:43 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 08:58:24 UTC

Technical Analysis

CVE-2026-20422 is a vulnerability classified under CWE-617 (Reachable Assertion) found in multiple MediaTek modem chipsets including MT2735 through MT8893 series. The flaw arises from improper input validation within the modem firmware, which can trigger an assertion failure leading to a system crash. This crash results in a denial of service condition affecting the modem’s operation. Exploitation requires an attacker to operate a rogue base station that a user equipment (UE) connects to, enabling the attacker to send crafted inputs that trigger the assertion. No additional privileges or user interaction are necessary, making the attack vector relatively straightforward once the attacker controls the network environment. The affected modem versions are NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices and potentially embedded telecommunications equipment. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). Although no exploits have been reported in the wild, the vulnerability poses a risk of remote denial of service, potentially disrupting communications. MediaTek has assigned a patch ID (MOLY00827332) and issue ID (MSV-5919), indicating a fix is available or forthcoming. The vulnerability is significant for devices relying on these chipsets, especially in environments where rogue base stations could be deployed, such as public spaces or targeted attacks.

Potential Impact

For European organizations, this vulnerability could lead to service disruptions in mobile communications and IoT devices using affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises relying on cellular connectivity for critical operations may experience degraded service availability or outages. The remote denial of service could be exploited in targeted attacks using rogue base stations, potentially impacting user devices, embedded systems, and network equipment. This may affect sectors such as finance, healthcare, transportation, and public safety that depend on reliable mobile connectivity. Additionally, the presence of rogue base stations is a known threat vector in urban and high-value areas, increasing the risk of exploitation. While confidentiality and integrity are not directly impacted, the loss of availability can disrupt business continuity and emergency communications. The broad range of affected modem versions suggests a wide footprint, increasing the potential scale of impact across European markets.

Mitigation Recommendations

1. Apply the official MediaTek patch identified by Patch ID MOLY00827332 as soon as it becomes available to ensure the vulnerability is remediated at the firmware level. 2. Implement network monitoring solutions capable of detecting rogue base stations or suspicious cellular network behavior to prevent devices from connecting to attacker-controlled infrastructure. 3. Employ mobile device management (MDM) policies to enforce firmware updates and restrict connections to trusted networks where feasible. 4. Educate users and administrators about the risks of connecting to unknown or unsecured cellular networks, especially in sensitive or high-risk environments. 5. Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within their networks. 6. For critical infrastructure, consider deploying multi-factor communication channels or fallback mechanisms to maintain availability if cellular connectivity is disrupted. 7. Conduct regular security assessments and penetration testing focused on cellular network security to identify potential exploitation paths. 8. Maintain an inventory of devices using affected MediaTek chipsets to prioritize patching and monitoring efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.010Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69806096f9fa50a62f0b42d1

Added to database: 2/2/2026, 8:30:14 AM

Last enriched: 2/18/2026, 8:58:24 AM

Last updated: 3/23/2026, 10:21:07 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses