CVE-2026-20402
📋 TL;DR
This vulnerability in MediaTek modems allows remote denial of service through improper input validation. Attackers can crash affected devices by connecting them to rogue base stations without user interaction. All devices using vulnerable MediaTek modem firmware are affected.
💻 Affected Systems
- MediaTek modem chipsets
⚠️ Risk & Real-World Impact
Worst Case
Permanent device bricking requiring hardware replacement, complete loss of cellular connectivity, and potential cascading failures in cellular networks.
Likely Case
Temporary device crash requiring reboot, loss of cellular service until restart, and potential data corruption during crash.
If Mitigated
Minimal impact with proper network segmentation and base station authentication controls preventing rogue base station connections.
🎯 Exploit Status
Requires attacker to operate rogue base station, which requires specialized equipment but no authentication or user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY00693083
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/February-2026
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply MediaTek modem firmware update containing patch MOLY00693083. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable automatic network selection
androidManually select trusted network operators to prevent connection to rogue base stations
Settings > Network & Internet > Mobile network > Network operators > Choose manually
Enable base station authentication
allConfigure network to require base station authentication if supported by carrier
🧯 If You Can't Patch
- Segment cellular devices on separate network segments with strict firewall rules
- Implement network monitoring for unusual base station connections and device crashes
🔍 How to Verify
Check if Vulnerable:
Check modem firmware version against MediaTek security bulletin; contact device manufacturer for specific vulnerability status.
Check Version:
adb shell getprop | grep gsm.version.baseband (for Android devices)
Verify Fix Applied:
Verify patch MOLY00693083 is applied in modem firmware version; check with device manufacturer's update documentation.
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Modem crash logs
- Base station connection failures
- Kernel panic related to modem
Network Indicators:
- Devices connecting to unknown base station IDs
- Unusual cellular network traffic patterns
- Multiple devices crashing simultaneously
SIEM Query:
source="android_logs" AND ("modem crash" OR "baseband crash" OR "gsm.version.baseband" AND event_type="crash")