CVE-2025-20761

6.5 MEDIUM

📋 TL;DR

This vulnerability in MediaTek modems allows remote denial of service attacks when a user equipment (UE) connects to a rogue base station controlled by an attacker. The system crash occurs due to incorrect error handling in the modem firmware, requiring no user interaction or additional privileges. This affects devices with vulnerable MediaTek modem chipsets.

💻 Affected Systems

Products:
  • MediaTek modem chipsets
Versions: Specific firmware versions not publicly detailed in advisory
Operating Systems: Android and other OS using affected MediaTek modems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable MediaTek modem firmware; exact device models not specified in available advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device bricking requiring hardware replacement, or persistent denial of service rendering the device unusable for cellular connectivity.

🟠

Likely Case

Temporary system crash requiring device reboot, with potential data loss and service disruption until device restarts.

🟢

If Mitigated

Limited impact with proper network segmentation and base station authentication controls preventing connection to rogue base stations.

🌐 Internet-Facing: HIGH - Attack can be triggered remotely via cellular network without authentication.
🏢 Internal Only: LOW - Requires cellular network access, not typical internal network vectors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to operate rogue base station (IMSI catcher/stingray) and victim device to connect to it.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware with patch ID MOLY01311265

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2026

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply MediaTek modem firmware update containing patch MOLY01311265. 3. Reboot device after update.

🔧 Temporary Workarounds

Disable automatic network selection

all

Manually select trusted network operators to prevent automatic connection to rogue base stations

Enable airplane mode in untrusted areas

all

Disable cellular radio when in locations where rogue base stations might operate

🧯 If You Can't Patch

  • Implement network monitoring for IMSI catchers/rogue base stations in critical areas
  • Use devices with different modem chipsets for critical operations

🔍 How to Verify

Check if Vulnerable:

Check device specifications for MediaTek modem and contact manufacturer for vulnerability status

Check Version:

Manufacturer-specific commands; typically requires diagnostic mode or manufacturer tools

Verify Fix Applied:

Verify modem firmware version includes patch MOLY01311265 through manufacturer tools

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Base station ID changes without location movement
  • Frequent cellular disconnections

Network Indicators:

  • Unusual base station signals in unexpected locations
  • IMSI catcher detection alerts

SIEM Query:

Device logs showing modem crash events or base station handover anomalies

🔗 References

📤 Share & Export