fkie_cve-2025-20634
Vulnerability from fkie_nvd
Published
2025-02-03 04:15
Modified
2025-03-18 14:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436.
References
▼ | URL | Tags | |
---|---|---|---|
security@mediatek.com | https://corp.mediatek.com/product-security-bulletin/February-2025 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mediatek | nr16 | - | |
mediatek | nr17 | - | |
mediatek | nr17r | - | |
mediatek | mt2737 | - | |
mediatek | mt6813 | - | |
mediatek | mt6835 | - | |
mediatek | mt6835t | - | |
mediatek | mt6878 | - | |
mediatek | mt6878m | - | |
mediatek | mt6879 | - | |
mediatek | mt6886 | - | |
mediatek | mt6895 | - | |
mediatek | mt6895tt | - | |
mediatek | mt6896 | - | |
mediatek | mt6897 | - | |
mediatek | mt6899 | - | |
mediatek | mt6980 | - | |
mediatek | mt6980d | - | |
mediatek | mt6983 | - | |
mediatek | mt6983t | - | |
mediatek | mt6985 | - | |
mediatek | mt6985t | - | |
mediatek | mt6989 | - | |
mediatek | mt6989t | - | |
mediatek | mt6990 | - | |
mediatek | mt6991 | - | |
mediatek | mt8673 | - | |
mediatek | mt8676 | - | |
mediatek | mt8678 | - | |
mediatek | mt8795t | - | |
mediatek | mt8798 | - | |
mediatek | mt8863 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:mediatek:nr16:-:*:*:*:*:*:*:*", matchCriteriaId: "2B763B71-F913-45B4-B91E-D7F0670C4315", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr17:-:*:*:*:*:*:*:*", matchCriteriaId: "66F8874B-DBF1-4A67-8ADF-4654AB56B6A8", vulnerable: true, }, { criteria: "cpe:2.3:o:mediatek:nr17r:-:*:*:*:*:*:*:*", matchCriteriaId: "BC63582A-F9A5-4450-A263-CE1FD4B4F3AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*", matchCriteriaId: "9C2A1118-B5F7-4EF5-B329-0887B5F3430E", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*", matchCriteriaId: "66F9EAE4-F1D7-46DB-AA2A-0290F6EF0501", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*", matchCriteriaId: "19A63103-C708-48EC-B44D-5E465A6B79C5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6835t:-:*:*:*:*:*:*:*", matchCriteriaId: "C7FE7DBA-479C-402B-8485-9D14E70F25EB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*", matchCriteriaId: "855A8046-34ED-4891-ACE5-76AB10AC8D53", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6878m:-:*:*:*:*:*:*:*", matchCriteriaId: "483B6FB0-D683-4F3C-BA5B-6C9852179854", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", matchCriteriaId: "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*", matchCriteriaId: "AF3E2B84-DAFE-4E11-B23B-026F719475F5", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", matchCriteriaId: "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6895tt:-:*:*:*:*:*:*:*", matchCriteriaId: "2141B30A-C56F-4831-8FCD-4758DF97AD18", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6896:-:*:*:*:*:*:*:*", matchCriteriaId: "33DEF766-EAF1-4E36-BB7C-43069B26507A", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*", matchCriteriaId: "2A7D8055-F4B6-41EE-A078-11D56285AB66", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*", matchCriteriaId: "C6E9F80F-9AC9-41E0-BB14-9DB6F14B62CD", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*", matchCriteriaId: "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6980d:-:*:*:*:*:*:*:*", matchCriteriaId: "2758122C-4D11-4D34-9B72-3905F3A28448", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", matchCriteriaId: "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6983t:-:*:*:*:*:*:*:*", matchCriteriaId: "A7D6430E-840D-447F-892E-EA4FD7F69BAF", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*", matchCriteriaId: "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6985t:-:*:*:*:*:*:*:*", matchCriteriaId: "DEBB2AE0-F6CD-4CAF-BBF2-09C5C20B9910", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*", matchCriteriaId: "AD7DE6B2-66D9-4A3E-B15F-D56505559255", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6989t:-:*:*:*:*:*:*:*", matchCriteriaId: "6309AE48-7266-435C-B906-50960F643FC8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*", matchCriteriaId: "1A76806D-A4E3-466A-90CB-E9FFE478E7A0", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*", matchCriteriaId: "CBBB30DF-E963-4940-B742-F6801F68C3FC", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*", matchCriteriaId: "152F6606-FA23-4530-AA07-419866B74CB3", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*", matchCriteriaId: "EE302F6F-170E-4350-A8F4-65BE0C50CB78", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*", matchCriteriaId: "152A5F3D-8004-4649-BDB1-E6F0798AF1CB", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*", matchCriteriaId: "78D4E9E1-B044-41EC-BE98-22DC0E5E9010", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*", matchCriteriaId: "637CAAD2-DCC0-4F81-B781-5D0536844CA8", vulnerable: false, }, { criteria: "cpe:2.3:h:mediatek:mt8863:-:*:*:*:*:*:*:*", matchCriteriaId: "77E0D738-F0B9-468F-8A10-204F498320BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01289384; Issue ID: MSV-2436.", }, { lang: "es", value: "En el módem, existe una posible escritura fuera de los límites debido a un neutra. Esto podría provocar la ejecución remota de código, si un UE se ha conectado a una estación base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecución adicionales. No se necesita la interacción del usuario para la explotación. ID de parche: MOLY01289384; ID de problema: MSV-2436.", }, ], id: "CVE-2025-20634", lastModified: "2025-03-18T14:15:41.747", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2025-02-03T04:15:08.423", references: [ { source: "security@mediatek.com", tags: [ "Vendor Advisory", ], url: "https://corp.mediatek.com/product-security-bulletin/February-2025", }, ], sourceIdentifier: "security@mediatek.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "security@mediatek.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.