CVE-2025-20678
📋 TL;DR
This vulnerability in MediaTek's IMS service allows remote denial of service attacks when a user equipment (UE) connects to a malicious base station. Attackers can crash the system without user interaction or special privileges. This affects devices using MediaTek chipsets with vulnerable IMS implementations.
💻 Affected Systems
- MediaTek chipsets with IMS service
📦 What is this software?
Lr12a by Mediatek
Lr13 by Mediatek
Nr15 by Mediatek
Nr16 by Mediatek
Nr17 by Mediatek
Nr17r by Mediatek
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash and service disruption for affected mobile devices, potentially requiring physical restart or factory reset.
Likely Case
Temporary service disruption and device instability when connecting to rogue base stations in targeted attacks.
If Mitigated
Limited impact with proper network segmentation and base station authentication controls in place.
🎯 Exploit Status
Requires attacker to control a rogue base station; no user interaction needed
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY01394606
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/June-2025
Restart Required: Yes
Instructions:
1. Check MediaTek security bulletin for device-specific patches. 2. Apply firmware updates from device manufacturer. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable automatic network switching
androidPrevent devices from automatically connecting to unknown base stations
Enable base station authentication
allConfigure devices to only connect to authenticated base stations
🧯 If You Can't Patch
- Implement network monitoring for rogue base station detection
- Restrict device connectivity to trusted networks only
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against MediaTek security bulletin; devices with unpatched IMS service are vulnerable
Check Version:
Check device settings > About phone > Build number
Verify Fix Applied:
Verify patch MOLY01394606 is applied in device firmware version
📡 Detection & Monitoring
Log Indicators:
- IMS service crash logs
- Unexpected base station connection attempts
- System stability issues
Network Indicators:
- Connections to unauthorized base stations
- Unusual IMS protocol traffic patterns
SIEM Query:
source="device_logs" AND (event="ims_crash" OR event="base_station_auth_fail")