CVE-2025-20634
📋 TL;DR
This critical vulnerability in MediaTek modems allows remote code execution when a device connects to a malicious base station. Attackers can exploit an out-of-bounds write flaw to execute arbitrary code without user interaction. All devices with affected MediaTek modem chips are vulnerable.
💻 Affected Systems
- MediaTek modem chips
📦 What is this software?
Nr16 by Mediatek
Nr17 by Mediatek
Nr17r by Mediatek
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent malware, steal sensitive data, or use device as botnet node.
Likely Case
Targeted attacks against specific individuals or organizations using rogue base stations in proximity to victims.
If Mitigated
Limited impact if devices are patched before connecting to untrusted networks or if network-level protections block malicious base stations.
🎯 Exploit Status
Exploitation requires attacker to operate rogue base station, which requires specialized equipment but is feasible for determined attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY01289384
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/February-2025
Restart Required: Yes
Instructions:
1. Contact device manufacturer for firmware updates. 2. Apply MediaTek-provided modem firmware patch. 3. Reboot device after patch installation. 4. Verify patch via modem firmware version check.
🔧 Temporary Workarounds
Disable automatic network selection
allPrevent devices from automatically connecting to unknown base stations
Use trusted networks only
allConfigure devices to connect only to known, trusted cellular networks
🧯 If You Can't Patch
- Physically isolate devices from untrusted cellular networks
- Implement network monitoring for suspicious base station connections
🔍 How to Verify
Check if Vulnerable:
Check device specifications for MediaTek modem and contact manufacturer for vulnerability status
Check Version:
Manufacturer-specific commands vary by device; check with OEM
Verify Fix Applied:
Verify modem firmware version includes patch MOLY01289384 via manufacturer tools
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem firmware crashes
- Suspicious base station connections in modem logs
Network Indicators:
- Connections to unknown base station IDs
- Unusual cellular network behavior
SIEM Query:
Search for modem error codes or unexpected base station handoffs in device logs