CVE-2025-20678

6.5 MEDIUM

📋 TL;DR

This vulnerability in MediaTek's IMS service allows remote denial of service attacks when a user equipment (UE) connects to a malicious base station. Attackers can crash the system without user interaction or special privileges. This affects devices using MediaTek chipsets with vulnerable IMS implementations.

💻 Affected Systems

Products:
  • MediaTek chipsets with IMS service
Versions: Specific versions not publicly disclosed in CVE description
Operating Systems: Android-based systems using MediaTek chipsets
Default Config Vulnerable: ⚠️ Yes
Notes: Requires connection to rogue base station; affects mobile devices with MediaTek chipsets

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash and service disruption for affected mobile devices, potentially requiring physical restart or factory reset.

🟠

Likely Case

Temporary service disruption and device instability when connecting to rogue base stations in targeted attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and base station authentication controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to control a rogue base station; no user interaction needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch ID: MOLY01394606

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/June-2025

Restart Required: Yes

Instructions:

1. Check MediaTek security bulletin for device-specific patches. 2. Apply firmware updates from device manufacturer. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable automatic network switching

android

Prevent devices from automatically connecting to unknown base stations

Enable base station authentication

all

Configure devices to only connect to authenticated base stations

🧯 If You Can't Patch

  • Implement network monitoring for rogue base station detection
  • Restrict device connectivity to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against MediaTek security bulletin; devices with unpatched IMS service are vulnerable

Check Version:

Check device settings > About phone > Build number

Verify Fix Applied:

Verify patch MOLY01394606 is applied in device firmware version

📡 Detection & Monitoring

Log Indicators:

  • IMS service crash logs
  • Unexpected base station connection attempts
  • System stability issues

Network Indicators:

  • Connections to unauthorized base stations
  • Unusual IMS protocol traffic patterns

SIEM Query:

source="device_logs" AND (event="ims_crash" OR event="base_station_auth_fail")

🔗 References

📤 Share & Export