CVE-2025-20793

6.5 MEDIUM

📋 TL;DR

This vulnerability in MediaTek modems allows remote denial of service through system crashes when devices connect to rogue base stations. Attackers can exploit incorrect error handling to crash affected devices without user interaction. This affects smartphones and IoT devices using vulnerable MediaTek modem chipsets.

💻 Affected Systems

Products:
  • MediaTek modem chipsets
Versions: Specific versions not publicly disclosed in advisory
Operating Systems: Android, Linux-based IoT systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with vulnerable MediaTek modem firmware; exact device models not specified in advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Permanent device bricking requiring hardware replacement, complete loss of cellular connectivity, and potential data corruption.

🟠

Likely Case

Temporary device crashes requiring reboot, service disruption, and potential data loss during active sessions.

🟢

If Mitigated

Limited impact with proper network segmentation and base station authentication controls in place.

🌐 Internet-Facing: HIGH - Exploitable via rogue base stations that can be deployed anywhere with cellular coverage.
🏢 Internal Only: LOW - Requires physical proximity or specialized equipment to deploy rogue base station.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to deploy rogue base station equipment, which is specialized but commercially available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patch ID: MOLY01430930

Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2026

Restart Required: Yes

Instructions:

1. Contact device manufacturer for firmware updates. 2. Apply MediaTek modem firmware patch MOLY01430930. 3. Reboot device after patch installation.

🔧 Temporary Workarounds

Disable automatic network selection

all

Prevent devices from automatically connecting to unknown base stations

Enable base station authentication

all

Configure devices to only connect to authenticated/trusted base stations

🧯 If You Can't Patch

  • Deploy network monitoring for rogue base station detection
  • Implement physical security controls to prevent unauthorized base station deployment in sensitive areas

🔍 How to Verify

Check if Vulnerable:

Check modem firmware version against MediaTek security bulletin; contact device manufacturer for specific vulnerability status.

Check Version:

Device-specific; typically requires manufacturer diagnostic tools or hidden system menus.

Verify Fix Applied:

Verify patch MOLY01430930 is installed in modem firmware; check with device manufacturer for patch verification procedures.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modem resets
  • Base station connection errors
  • System crash logs with modem-related stack traces

Network Indicators:

  • Connections to unknown base station IDs
  • Unusual cellular network behavior patterns

SIEM Query:

Search for modem crash events, unexpected base station handovers, or cellular interface errors in device logs.

🔗 References

📤 Share & Export