CVE-2026-20449
Received Received - Intake
Heap Buffer Overflow in Modem Leads to DoS

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: MediaTek, Inc.

Description
In Modem, there is a possible system crash due to a heap buffer overflow. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01760138; Issue ID: MSV-6148.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mediatek modem From MT2735 (inc) to MT8791 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-20449 is a high-severity vulnerability in the Modem subcomponent of multiple MediaTek chipsets. It is caused by a heap buffer overflow, which is a type of memory corruption where more data is written to a buffer than it can hold.

This overflow can cause the system to crash if a user equipment (UE) connects to a rogue base station controlled by an attacker. No user interaction or additional execution privileges are needed to exploit this vulnerability.

The vulnerability is classified under CWE-120, indicating it is a classic buffer overflow issue.


How can this vulnerability impact me? :

This vulnerability can lead to a remote denial of service (DoS) condition by causing the system to crash when a device connects to a malicious base station.

Since no user interaction or additional privileges are required, an attacker can exploit this remotely, potentially disrupting device availability and connectivity.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, apply the security patches provided by MediaTek to device OEMs. These patches address the heap buffer overflow in the Modem subcomponent and prevent potential system crashes caused by connections to rogue base stations.

Since the vulnerability does not require user interaction and can be exploited remotely, it is critical to update affected devices as soon as possible with the official patch identified as MOLY01760138.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There is no specific information provided about detection methods or commands to identify this vulnerability on a network or system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart