Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

MediaTek Security Update – Patch for Multiple Vulnerabilities Across Chipsets

Posted on September 1, 2025September 1, 2025 By CWS

MediaTek at present printed a essential safety bulletin addressing a number of vulnerabilities throughout its newest modem chipsets, urging gadget OEMs to deploy updates instantly. 

The bulletin, issued two months after confidential OEM notification, confirms that no recognized in-the-wild exploits have been detected up to now.

Key Takeaways1. MediaTek patched high- and medium-severity modem and firmware bugs throughout 60+ chipsets.2. OEMs acquired fixes in July; replace Modem NR and BSP now.3. No exploitation detected.

Excessive-Severity Out-of-Bounds Flaws

Three high-severity Widespread Vulnerability Scoring System model 3.1 (CVSS v3.1)–rated flaws have an effect on the Modem firmware on dozens of MediaTek chipsets.

CVE-2025-20708: An out-of-bounds write (CWE-787) within the Modem’s buffer‐validation logic permits distant privilege escalation when a person tools (UE) connects to a rogue base station. 

No person interplay is required to set off the vulnerability. Affected chipsets embrace MT6813, MT6833, MT6855, MT8873, MT8893, and over 60 extra fashions operating Modem NR15–NR17R software program variations.

CVE-2025-20703: An out-of-bounds learn (CWE-125) in the identical Modem element permits distant denial-of-service underneath comparable circumstances and with no person interplay. 

Impacted silicon spans MT2735, MT6789, MT6893, MT8678, MT8791T, MT8883, amongst others, all on NR15–NR17R releases.

CVE-2025-20704: A second out-of-bounds write (CWE-787) stemming from a lacking bounds test can even yield distant privilege escalation, although person interplay is required for exploitation. 

The flaw targets a subset of chipsets—MT6835T, MT6899, MT6991, MT8676, MT8792, and a dozen extra—operating Modem NR17 and NR17R builds.

Medium-Severity Reminiscence Corruption Flaws

Three medium-severity use-after-free bugs (CWE-416) reside within the monitor_hang, mbrain, and geniezone modules of the chipset firmware:

CVE-2025-20705 (“monitor_hang uaf”): A use-after-free error might allow native privilege escalation for attackers who already possess System privileges. 

A broad vary of chipsets from MT2718 to MT8796 throughout Android 13–16, OpenWRT 19.07/21.02, and Yocto 2.6 releases are affected.

CVE-2025-20706 (“mbrain uaf”): Related reminiscence corruption within the mbrain process scheduler on MT6899, MT6989, MT6991, MT8676, and MT8678 operating Android 14–15 could result in native code execution.

CVE-2025-20707 (“geniezone uaf”): A flaw within the geniezone service can lead to reminiscence corruption underneath native privilege circumstances on MT2718, MT6853, MT8792, MT8883, and different fashions throughout Android 13–15.

CVETitleSeverityCVE-2025-20708Out-of-bounds write in ModemHighCVE-2025-20703Out-of-bounds learn in ModemHighCVE-2025-20704Out-of-bounds write in ModemHighCVE-2025-20705Use after free in monitor_hangMediumCVE-2025-20706Use after free in mbrainMediumCVE-2025-20707Use after free in geniezoneMedium

All vulnerabilities have been found through exterior safety analysis, besides CVE-2025-20704, which was recognized by inside validation groups. 

OEM companions have acquired patches since July, and closing firmware photos incorporating these fixes will start rolling out instantly. 

MediaTek reminds integrators to improve Modem NR and Android BSP variations to mitigate dangers.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Chipsets, MediaTek, Multiple, Patch, Security, Update, Vulnerabilities

Post navigation

Previous Post: Salesforce Releases Forensic Investigation Guide Following Chain of Attacks
Next Post: New Large-Scale Phishing Attacks Targets Hotelier Via Ads to Gain Access to Property Management Tools

Related Posts

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News
Linux 6.16 Released – Optimized for Better Performance and Networking Cyber Security News
New ClickFix Attack Uses Fake BBC News Page and Fraudulent Cloudflare Verification to Trick Users Cyber Security News
WAFs protection Bypassed to Execute XSS Payloads Using JS Injection with Parameter Pollution Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 10 Best Cloud Penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 10 Best Cloud Penetration Testing Companies in 2025
  • Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
  • “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload
  • Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys
  • Kali Linux vs Parrot OS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News