Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MediaTek Security Update – Patch for Multiple Vulnerabilities Across Chipsets

Posted on September 1, 2025September 1, 2025 By CWS

MediaTek at present printed a essential safety bulletin addressing a number of vulnerabilities throughout its newest modem chipsets, urging gadget OEMs to deploy updates instantly. 

The bulletin, issued two months after confidential OEM notification, confirms that no recognized in-the-wild exploits have been detected up to now.

Key Takeaways1. MediaTek patched high- and medium-severity modem and firmware bugs throughout 60+ chipsets.2. OEMs acquired fixes in July; replace Modem NR and BSP now.3. No exploitation detected.

Excessive-Severity Out-of-Bounds Flaws

Three high-severity Widespread Vulnerability Scoring System model 3.1 (CVSS v3.1)–rated flaws have an effect on the Modem firmware on dozens of MediaTek chipsets.

CVE-2025-20708: An out-of-bounds write (CWE-787) within the Modem’s buffer‐validation logic permits distant privilege escalation when a person tools (UE) connects to a rogue base station. 

No person interplay is required to set off the vulnerability. Affected chipsets embrace MT6813, MT6833, MT6855, MT8873, MT8893, and over 60 extra fashions operating Modem NR15–NR17R software program variations.

CVE-2025-20703: An out-of-bounds learn (CWE-125) in the identical Modem element permits distant denial-of-service underneath comparable circumstances and with no person interplay. 

Impacted silicon spans MT2735, MT6789, MT6893, MT8678, MT8791T, MT8883, amongst others, all on NR15–NR17R releases.

CVE-2025-20704: A second out-of-bounds write (CWE-787) stemming from a lacking bounds test can even yield distant privilege escalation, although person interplay is required for exploitation. 

The flaw targets a subset of chipsets—MT6835T, MT6899, MT6991, MT8676, MT8792, and a dozen extra—operating Modem NR17 and NR17R builds.

Medium-Severity Reminiscence Corruption Flaws

Three medium-severity use-after-free bugs (CWE-416) reside within the monitor_hang, mbrain, and geniezone modules of the chipset firmware:

CVE-2025-20705 (“monitor_hang uaf”): A use-after-free error might allow native privilege escalation for attackers who already possess System privileges. 

A broad vary of chipsets from MT2718 to MT8796 throughout Android 13–16, OpenWRT 19.07/21.02, and Yocto 2.6 releases are affected.

CVE-2025-20706 (“mbrain uaf”): Related reminiscence corruption within the mbrain process scheduler on MT6899, MT6989, MT6991, MT8676, and MT8678 operating Android 14–15 could result in native code execution.

CVE-2025-20707 (“geniezone uaf”): A flaw within the geniezone service can lead to reminiscence corruption underneath native privilege circumstances on MT2718, MT6853, MT8792, MT8883, and different fashions throughout Android 13–15.

CVETitleSeverityCVE-2025-20708Out-of-bounds write in ModemHighCVE-2025-20703Out-of-bounds learn in ModemHighCVE-2025-20704Out-of-bounds write in ModemHighCVE-2025-20705Use after free in monitor_hangMediumCVE-2025-20706Use after free in mbrainMediumCVE-2025-20707Use after free in geniezoneMedium

All vulnerabilities have been found through exterior safety analysis, besides CVE-2025-20704, which was recognized by inside validation groups. 

OEM companions have acquired patches since July, and closing firmware photos incorporating these fixes will start rolling out instantly. 

MediaTek reminds integrators to improve Modem NR and Android BSP variations to mitigate dangers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Chipsets, MediaTek, Multiple, Patch, Security, Update, Vulnerabilities

Post navigation

Previous Post: Salesforce Releases Forensic Investigation Guide Following Chain of Attacks
Next Post: New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools

Related Posts

Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns Cyber Security News
ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix Cyber Security News
BlueNoroff Hackers Adopts New Infiltration Strategies To Attack C-Level Executives, and Managers Cyber Security News
Hackers Weaponizing Calendar Files as a New Attack Vector Bypassing Traditional Email Defenses Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
  • Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite
  • North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
  • Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite
  • North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews
  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark