CVE-2026-20449
Heap Buffer Overflow in Modem Leads to DoS
Publication date: 2026-05-04
Last updated on: 2026-05-04
Assigner: MediaTek, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mediatek | modem | From MT2735 (inc) to MT8791 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-20449 is a high-severity vulnerability in the Modem subcomponent of multiple MediaTek chipsets. It is caused by a heap buffer overflow, which is a type of memory corruption where more data is written to a buffer than it can hold.
This overflow can cause the system to crash if a user equipment (UE) connects to a rogue base station controlled by an attacker. No user interaction or additional execution privileges are needed to exploit this vulnerability.
The vulnerability is classified under CWE-120, indicating it is a classic buffer overflow issue.
How can this vulnerability impact me? :
This vulnerability can lead to a remote denial of service (DoS) condition by causing the system to crash when a device connects to a malicious base station.
Since no user interaction or additional privileges are required, an attacker can exploit this remotely, potentially disrupting device availability and connectivity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, apply the security patches provided by MediaTek to device OEMs. These patches address the heap buffer overflow in the Modem subcomponent and prevent potential system crashes caused by connections to rogue base stations.
Since the vulnerability does not require user interaction and can be exploited remotely, it is critical to update affected devices as soon as possible with the official patch identified as MOLY01760138.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There is no specific information provided about detection methods or commands to identify this vulnerability on a network or system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.