CVE-2025-20757

6.5 MEDIUM

📋 TL;DR

This vulnerability in MediaTek modems allows remote denial of service through improper input validation. An attacker can crash the system by connecting a device to a rogue base station, requiring no user interaction or special privileges. This affects devices using vulnerable MediaTek modem chipsets.

💻 Affected Systems

Products:
  • MediaTek modem chipsets
Versions: Specific versions not publicly detailed in advisory
Operating Systems: Android and other OS using MediaTek modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable MediaTek modem firmware; exact device models not specified in public advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device/system crash requiring physical restart, potentially disrupting critical communications and services.

🟠

Likely Case

Temporary service disruption and device instability requiring reboot, affecting cellular connectivity.

🟢

If Mitigated

Minimal impact with proper network segmentation and rogue base station detection in place.

🌐 Internet-Facing: HIGH - Attack can be triggered remotely via cellular networks without authentication.
🏢 Internal Only: LOW - Requires cellular network access, not typical internal network vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to operate rogue base station, which requires specialized equipment and knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch ID: MOLY01673751

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/December-2025

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply modem firmware patch MOLY01673751. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable automatic network switching

all

Prevent devices from connecting to unknown base stations

Use trusted networks only

all

Configure devices to connect only to pre-approved cellular networks

🧯 If You Can't Patch

  • Implement network monitoring for rogue base station detection
  • Isolate critical devices from untrusted cellular networks

🔍 How to Verify

Check if Vulnerable:

Check modem firmware version against vendor advisory; contact device manufacturer for specific vulnerability status.

Check Version:

Device-specific commands vary; typically in Android: Settings > About Phone > Baseband version

Verify Fix Applied:

Verify modem firmware has been updated to include patch MOLY01673751.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Baseband processor crashes
  • Cellular connection drops

Network Indicators:

  • Devices connecting to unknown base stations
  • Unusual cellular network behavior

SIEM Query:

Search for modem/baseband crash events or unexpected cellular disconnections

🔗 References

📤 Share & Export