Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20434: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

0
High
VulnerabilityCVE-2026-20434cvecve-2026-20434cwe-787
Published: Mon Mar 02 2026 (03/02/2026, 08:39:10 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

Description

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY00782946; Issue ID: MSV-4135.

AI-Powered Analysis

AILast updated: 03/02/2026, 09:13:27 UTC

Technical Analysis

CVE-2026-20434 is a critical security vulnerability classified as an out-of-bounds write (CWE-787) found in the modem firmware of a large set of MediaTek chipsets, including models MT2735 through MT8893 and others. The vulnerability stems from a missing bounds check in the modem's code, which can be triggered when a user equipment (UE) connects to a rogue base station controlled by an attacker. This rogue base station can send specially crafted signals or data that exploit the out-of-bounds write, leading to memory corruption within the modem firmware. The corrupted memory state can enable the attacker to escalate privileges remotely within the modem subsystem without requiring any additional execution privileges or complex authentication. User interaction is necessary, meaning the UE must connect to the malicious base station, which could occur if the device is in an area with attacker-controlled infrastructure or manipulated network conditions. The affected versions include modem firmware releases LR12A, LR13, NR15, NR16, and NR17. The vulnerability impacts the confidentiality and integrity of the device by potentially allowing attackers to execute arbitrary code or alter modem behavior, which could lead to interception or manipulation of communications. Although no known exploits have been reported in the wild, the broad range of affected chipsets—commonly used in smartphones and IoT devices worldwide—makes this a high-risk vulnerability. MediaTek has assigned a patch ID (MOLY00782946) and issue ID (MSV-4135), indicating that fixes are available or forthcoming. The absence of a CVSS score necessitates an expert severity assessment based on the technical details and potential impact.

Potential Impact

The impact of CVE-2026-20434 is significant for organizations and individuals relying on devices powered by affected MediaTek chipsets. Successful exploitation allows remote attackers to escalate privileges within the modem, potentially leading to unauthorized access to sensitive communications, interception of data, or manipulation of network connectivity. This could compromise confidentiality and integrity of user data and communications. For enterprises, especially those with mobile workforces or IoT deployments using affected chipsets, this vulnerability could lead to data breaches, espionage, or disruption of services. The requirement for user interaction (connection to a rogue base station) limits the attack vector but does not eliminate risk, particularly in high-risk environments where attackers may deploy rogue base stations to target specific users or groups. The wide range of affected chipsets means many consumer and enterprise devices globally are vulnerable, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Overall, the vulnerability could undermine trust in mobile communications and IoT device security if left unpatched.

Mitigation Recommendations

To mitigate CVE-2026-20434, organizations and users should prioritize applying firmware updates and patches provided by device manufacturers and MediaTek once available. Since the vulnerability resides in modem firmware, updating the device’s baseband software is critical. Network operators and device vendors should coordinate to distribute these updates promptly. Users should avoid connecting to unknown or suspicious cellular base stations, especially in untrusted environments, to reduce exposure to rogue base station attacks. Enterprises should implement mobile device management (MDM) solutions to enforce timely updates and monitor device network connections for anomalies. Additionally, deploying network anomaly detection systems that can identify rogue base stations or unusual cellular activity can help prevent exploitation. For high-security environments, consider restricting device connectivity to trusted networks or using VPNs to protect data confidentiality. Security teams should also monitor threat intelligence feeds for any emerging exploits related to this vulnerability. Finally, educating users about the risks of connecting to untrusted networks can reduce the likelihood of user interaction leading to exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2025-11-03T01:30:59.011Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a550ac32ffcdb8a2d8ac82

Added to database: 3/2/2026, 8:56:12 AM

Last enriched: 3/2/2026, 9:13:27 AM

Last updated: 3/2/2026, 11:09:41 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses