CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.
AI Analysis
Technical Summary
CVE-2026-20422 is a vulnerability classified under CWE-617 (Reachable Assertion) found in multiple MediaTek modem chipsets including MT2735 through MT8893 series. The flaw arises from improper input validation within the modem firmware, which can trigger an assertion failure leading to a system crash. This crash results in a denial of service condition affecting the modem’s operation. Exploitation requires an attacker to operate a rogue base station that a user equipment (UE) connects to, enabling the attacker to send crafted inputs that trigger the assertion. No additional privileges or user interaction are necessary, making the attack vector relatively straightforward once the attacker controls the network environment. The affected modem versions are NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices and potentially embedded telecommunications equipment. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). Although no exploits have been reported in the wild, the vulnerability poses a risk of remote denial of service, potentially disrupting communications. MediaTek has assigned a patch ID (MOLY00827332) and issue ID (MSV-5919), indicating a fix is available or forthcoming. The vulnerability is significant for devices relying on these chipsets, especially in environments where rogue base stations could be deployed, such as public spaces or targeted attacks.
Potential Impact
For European organizations, this vulnerability could lead to service disruptions in mobile communications and IoT devices using affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises relying on cellular connectivity for critical operations may experience degraded service availability or outages. The remote denial of service could be exploited in targeted attacks using rogue base stations, potentially impacting user devices, embedded systems, and network equipment. This may affect sectors such as finance, healthcare, transportation, and public safety that depend on reliable mobile connectivity. Additionally, the presence of rogue base stations is a known threat vector in urban and high-value areas, increasing the risk of exploitation. While confidentiality and integrity are not directly impacted, the loss of availability can disrupt business continuity and emergency communications. The broad range of affected modem versions suggests a wide footprint, increasing the potential scale of impact across European markets.
Mitigation Recommendations
1. Apply the official MediaTek patch identified by Patch ID MOLY00827332 as soon as it becomes available to ensure the vulnerability is remediated at the firmware level. 2. Implement network monitoring solutions capable of detecting rogue base stations or suspicious cellular network behavior to prevent devices from connecting to attacker-controlled infrastructure. 3. Employ mobile device management (MDM) policies to enforce firmware updates and restrict connections to trusted networks where feasible. 4. Educate users and administrators about the risks of connecting to unknown or unsecured cellular networks, especially in sensitive or high-risk environments. 5. Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within their networks. 6. For critical infrastructure, consider deploying multi-factor communication channels or fallback mechanisms to maintain availability if cellular connectivity is disrupted. 7. Conduct regular security assessments and penetration testing focused on cellular network security to identify potential exploitation paths. 8. Maintain an inventory of devices using affected MediaTek chipsets to prioritize patching and monitoring efforts.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Sweden, Poland, Belgium, Austria
CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
Description
In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-20422 is a vulnerability classified under CWE-617 (Reachable Assertion) found in multiple MediaTek modem chipsets including MT2735 through MT8893 series. The flaw arises from improper input validation within the modem firmware, which can trigger an assertion failure leading to a system crash. This crash results in a denial of service condition affecting the modem’s operation. Exploitation requires an attacker to operate a rogue base station that a user equipment (UE) connects to, enabling the attacker to send crafted inputs that trigger the assertion. No additional privileges or user interaction are necessary, making the attack vector relatively straightforward once the attacker controls the network environment. The affected modem versions are NR15, NR16, NR17, and NR17R, which are widely deployed in mobile devices and potentially embedded telecommunications equipment. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). Although no exploits have been reported in the wild, the vulnerability poses a risk of remote denial of service, potentially disrupting communications. MediaTek has assigned a patch ID (MOLY00827332) and issue ID (MSV-5919), indicating a fix is available or forthcoming. The vulnerability is significant for devices relying on these chipsets, especially in environments where rogue base stations could be deployed, such as public spaces or targeted attacks.
Potential Impact
For European organizations, this vulnerability could lead to service disruptions in mobile communications and IoT devices using affected MediaTek modems. Telecommunications providers, mobile network operators, and enterprises relying on cellular connectivity for critical operations may experience degraded service availability or outages. The remote denial of service could be exploited in targeted attacks using rogue base stations, potentially impacting user devices, embedded systems, and network equipment. This may affect sectors such as finance, healthcare, transportation, and public safety that depend on reliable mobile connectivity. Additionally, the presence of rogue base stations is a known threat vector in urban and high-value areas, increasing the risk of exploitation. While confidentiality and integrity are not directly impacted, the loss of availability can disrupt business continuity and emergency communications. The broad range of affected modem versions suggests a wide footprint, increasing the potential scale of impact across European markets.
Mitigation Recommendations
1. Apply the official MediaTek patch identified by Patch ID MOLY00827332 as soon as it becomes available to ensure the vulnerability is remediated at the firmware level. 2. Implement network monitoring solutions capable of detecting rogue base stations or suspicious cellular network behavior to prevent devices from connecting to attacker-controlled infrastructure. 3. Employ mobile device management (MDM) policies to enforce firmware updates and restrict connections to trusted networks where feasible. 4. Educate users and administrators about the risks of connecting to unknown or unsecured cellular networks, especially in sensitive or high-risk environments. 5. Collaborate with mobile network operators to enhance detection and mitigation of rogue base stations within their networks. 6. For critical infrastructure, consider deploying multi-factor communication channels or fallback mechanisms to maintain availability if cellular connectivity is disrupted. 7. Conduct regular security assessments and penetration testing focused on cellular network security to identify potential exploitation paths. 8. Maintain an inventory of devices using affected MediaTek chipsets to prioritize patching and monitoring efforts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- MediaTek
- Date Reserved
- 2025-11-03T01:30:59.010Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69806096f9fa50a62f0b42d1
Added to database: 2/2/2026, 8:30:14 AM
Last enriched: 2/18/2026, 8:58:24 AM
Last updated: 3/23/2026, 10:21:07 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.