Vulnerability
CVE-2025-20644
Component: CELLULAR
Location: FIRMWARE
In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.
Recent vulnerability.
This is a recently discovered vulnerability. Some information might be missing, as involved parties are still to publish further information. We periodically update vulnerability information to reflect eventual changes.
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
N/A
Severity (Android)
N/A
Chipsets
35
Devices
316
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MT6833 | Dimensity 6020 Dimensity 700 | MediaTek |
MT6853T | Dimensity 800U | MediaTek |
MT6873 | Dimensity 800 | MediaTek |
MT6833 | Dimensity 6080 Dimensity 810 | MediaTek |
MT6833P | Dimensity 810 | MediaTek |
MT6875 | Dimensity 820 | MediaTek |
MT6877 | Dimensity 900 | MediaTek |
MT6877 | Dimensity 920 | MediaTek |
MT6877T | Dimensity 920 | MediaTek |
MT6855 | Dimensity 930 | MediaTek |
35 of 35 row(s) shown.
Rows per page
Page 1 of 4
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2020
Reported:
Unknown
Advisory Published:
Mar 3, 2025
CVE Published:
N/A
Android Patch Level:
Mar 2025