In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01525673; Issue ID: MSV-2747.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/March-2025 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
22 Apr 2025, 13:48
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://corp.mediatek.com/product-security-bulletin/March-2025 - Vendor Advisory | |
First Time |
Mediatek mt6873
Mediatek mt8798 Mediatek mt6889 Mediatek mt6980 Mediatek mt6885 Mediatek nr16 Mediatek mt6877tt Mediatek nr15 Mediatek mt2737 Mediatek mt6985 Mediatek mt6855 Mediatek mt6895tt Mediatek mt6896 Mediatek mt6879 Mediatek mt6983 Mediatek mt6833p Mediatek mt6883 Mediatek mt6890 Mediatek mt8791t Mediatek mt6895 Mediatek mt6886 Mediatek mt6833 Mediatek mt6990 Mediatek mt6893 Mediatek mt6877 Mediatek mt6853 Mediatek mt6853t Mediatek mt6875t Mediatek mt6989t Mediatek mt6875 Mediatek Mediatek mt6983t Mediatek mt6877t Mediatek mt6985t Mediatek mt6891 Mediatek mt6989 Mediatek mt8795t Mediatek mt8673 Mediatek mt6880 Mediatek mt6855t Mediatek mt2735 Mediatek mt6980d |
|
CPE | cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:* |
04 Mar 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
03 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-03 03:15
Updated : 2025-04-22 13:48
NVD link : CVE-2025-20644
Mitre link : CVE-2025-20644
CVE.ORG link : CVE-2025-20644
JSON object : View
Products Affected
mediatek
- mt6890
- mt6989
- mt6873
- mt6883
- mt2735
- mt6895
- mt8791t
- mt2737
- mt6853
- mt6877t
- mt8798
- nr16
- mt6853t
- mt6980d
- mt6879
- mt6833p
- mt6885
- mt6886
- nr15
- mt6980
- mt6983t
- mt8795t
- mt6891
- mt6855
- mt6985t
- mt6893
- mt6896
- mt6855t
- mt6895tt
- mt6990
- mt6875
- mt6877tt
- mt6985
- mt6880
- mt6875t
- mt6889
- mt8673
- mt6989t
- mt6833
- mt6877
- mt6983
CWE