CVE-2025-20793
📋 TL;DR
This vulnerability in MediaTek modems allows remote denial of service through system crashes when devices connect to rogue base stations. Attackers can exploit incorrect error handling to crash affected devices without user interaction. This affects smartphones and IoT devices using vulnerable MediaTek modem chipsets.
💻 Affected Systems
- MediaTek modem chipsets
📦 What is this software?
Nr15 by Mediatek
Nr16 by Mediatek
Nr17 by Mediatek
Nr17r by Mediatek
⚠️ Risk & Real-World Impact
Worst Case
Permanent device bricking requiring hardware replacement, complete loss of cellular connectivity, and potential data corruption.
Likely Case
Temporary device crashes requiring reboot, service disruption, and potential data loss during active sessions.
If Mitigated
Limited impact with proper network segmentation and base station authentication controls in place.
🎯 Exploit Status
Requires attacker to deploy rogue base station equipment, which is specialized but commercially available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY01430930
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/January-2026
Restart Required: Yes
Instructions:
1. Contact device manufacturer for firmware updates. 2. Apply MediaTek modem firmware patch MOLY01430930. 3. Reboot device after patch installation.
🔧 Temporary Workarounds
Disable automatic network selection
allPrevent devices from automatically connecting to unknown base stations
Enable base station authentication
allConfigure devices to only connect to authenticated/trusted base stations
🧯 If You Can't Patch
- Deploy network monitoring for rogue base station detection
- Implement physical security controls to prevent unauthorized base station deployment in sensitive areas
🔍 How to Verify
Check if Vulnerable:
Check modem firmware version against MediaTek security bulletin; contact device manufacturer for specific vulnerability status.
Check Version:
Device-specific; typically requires manufacturer diagnostic tools or hidden system menus.
Verify Fix Applied:
Verify patch MOLY01430930 is installed in modem firmware; check with device manufacturer for patch verification procedures.
📡 Detection & Monitoring
Log Indicators:
- Unexpected modem resets
- Base station connection errors
- System crash logs with modem-related stack traces
Network Indicators:
- Connections to unknown base station IDs
- Unusual cellular network behavior patterns
SIEM Query:
Search for modem crash events, unexpected base station handovers, or cellular interface errors in device logs.