CVE-2025-20750

6.5 MEDIUM

📋 TL;DR

This vulnerability in MediaTek modems allows remote denial of service through improper input validation. An attacker can crash the system by having a user equipment (UE) connect to a malicious rogue base station. No user interaction or special privileges are required for exploitation.

💻 Affected Systems

Products:
  • MediaTek modem chipsets
Versions: Specific versions not publicly disclosed in CVE description
Operating Systems: Android and other mobile operating systems using affected MediaTek modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with MediaTek modems that have not applied the MOLY01661199 patch. Exact chipset models not specified in CVE.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash and denial of service, potentially requiring physical device restart or factory reset.

🟠

Likely Case

Temporary service disruption and device instability requiring reboot to restore functionality.

🟢

If Mitigated

Minimal impact with proper network controls preventing connection to untrusted base stations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to operate a rogue base station and have target device connect to it. No authentication or user interaction needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MOLY01661199

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/December-2025

Restart Required: Yes

Instructions:

1. Check with device manufacturer for firmware updates. 2. Apply MediaTek patch MOLY01661199. 3. Reboot device after patch installation.

🔧 Temporary Workarounds

Network restriction

all

Configure devices to only connect to trusted cellular networks and prevent automatic connection to unknown base stations.

Airplane mode in untrusted areas

all

Enable airplane mode or disable cellular connectivity in areas with untrusted cellular networks.

🧯 If You Can't Patch

  • Implement network monitoring to detect rogue base station activity
  • Restrict device usage to trusted cellular network environments only

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against manufacturer's security bulletin and verify if MOLY01661199 patch is applied.

Check Version:

Device-specific commands vary by manufacturer. Typically check in Settings > About Phone > Software Information.

Verify Fix Applied:

Confirm patch MOLY01661199 is installed via device firmware version check or manufacturer update verification.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Base station connection errors
  • System crash logs related to modem

Network Indicators:

  • Connections to unknown base station IDs
  • Unusual cellular network behavior

SIEM Query:

Search for modem crash events, base station connection anomalies, or system reboots with modem-related error codes.

🔗 References

📤 Share & Export