CVE-2025-20792

Dec. 3, 2025, 8:32 p.m.

5.3
Medium

Description

In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01717526; Issue ID: MSV-5591.

Product(s) Impacted

Vendor Product Versions
Mediatek
  • Nr15
  • Mt2735
  • Mt6833
  • Mt6833p
  • Mt6853
  • Mt6853t
  • Mt6855
  • Mt6855t
  • Mt6873
  • Mt6875
  • Mt6875t
  • Mt6877
  • Mt6877t
  • Mt6877tt
  • Mt6880
  • Mt6883
  • Mt6885
  • Mt6889
  • Mt6890
  • Mt6891
  • Mt6893
  • Mt8791t
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-617
Reachable Assertion
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o mediatek nr15 - / / / / / / /
h mediatek mt2735 - / / / / / / /
h mediatek mt6833 - / / / / / / /
h mediatek mt6833p - / / / / / / /
h mediatek mt6853 - / / / / / / /
h mediatek mt6853t - / / / / / / /
h mediatek mt6855 - / / / / / / /
h mediatek mt6855t - / / / / / / /
h mediatek mt6873 - / / / / / / /
h mediatek mt6875 - / / / / / / /
h mediatek mt6875t - / / / / / / /
h mediatek mt6877 - / / / / / / /
h mediatek mt6877t - / / / / / / /
h mediatek mt6877tt - / / / / / / /
h mediatek mt6880 - / / / / / / /
h mediatek mt6883 - / / / / / / /
h mediatek mt6885 - / / / / / / /
h mediatek mt6889 - / / / / / / /
h mediatek mt6890 - / / / / / / /
h mediatek mt6891 - / / / / / / /
h mediatek mt6893 - / / / / / / /
h mediatek mt8791t - / / / / / / /

CVSS Score

5.3 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: LOW
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

    View Vector String

Timeline

Published: Dec. 2, 2025, 3:16 a.m.
Last Modified: Dec. 3, 2025, 8:32 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@mediatek.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.