CVE-2026-20420
📋 TL;DR
This vulnerability in MediaTek modems allows remote denial of service through system crashes when devices connect to rogue base stations. Attackers can exploit incorrect error handling to crash affected devices without user interaction. All devices using vulnerable MediaTek modem firmware are affected.
💻 Affected Systems
- MediaTek modem chipsets
⚠️ Risk & Real-World Impact
Worst Case
Permanent device bricking requiring hardware replacement, complete loss of cellular connectivity, and potential cascading network failures affecting multiple devices.
Likely Case
Temporary device crashes requiring reboots, intermittent loss of cellular service, and degraded network performance in affected areas.
If Mitigated
Isolated device crashes with automatic recovery, minimal service disruption due to network redundancy, and quick patch deployment.
🎯 Exploit Status
Exploitation requires setting up rogue base station equipment but no authentication or user interaction needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY01738313
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/February-2026
Restart Required: Yes
Instructions:
1. Contact device manufacturer for firmware updates. 2. Apply MediaTek modem firmware patch MOLY01738313. 3. Reboot device after patch installation. 4. Verify patch application through modem firmware version check.
🔧 Temporary Workarounds
Disable automatic network switching
allPrevent devices from automatically connecting to unknown base stations
Enable only trusted networks
allConfigure devices to connect only to pre-approved cellular networks
🧯 If You Can't Patch
- Isolate affected devices from untrusted cellular networks
- Implement network monitoring for rogue base station detection
🔍 How to Verify
Check if Vulnerable:
Check modem firmware version against MediaTek security bulletin for vulnerable versions
Check Version:
Device-specific modem firmware check commands vary by manufacturer
Verify Fix Applied:
Verify modem firmware includes patch MOLY01738313 and check for absence of crash logs
📡 Detection & Monitoring
Log Indicators:
- Modem crash logs
- Unexpected base station connection attempts
- Error handling failure messages
Network Indicators:
- Unusual base station signals
- Multiple device crashes in same geographic area
- Abnormal cellular handoff patterns
SIEM Query:
source="modem_logs" AND ("crash" OR "error_handling" OR "rogue_base_station")