Impact
An out-of-bounds write in the MediaTek Modem firmware, caused by a missing bounds check, can lead to remote escalation of privilege. The flaw allows a malicious base station to write beyond the intended memory bounds when a user equipment (UE) connects, granting elevated privileges without any additional execution privileges. User interaction is required for the exploit to succeed, typically when the device is connected to a rogue base station.
Affected Systems
The vulnerability affects devices powered by MediaTek chipsets. No specific firmware version ranges are listed, but the issued patch MOLY01088681 addresses the issue and should be applied to all affected MediaTek Modem implementations.
Risk and Exploitability
This flaw carries a high CVSS score of 8.8, indicating significant potential impact. The EPSS score is below 1 %, suggesting that automated exploitation is currently unlikely, and it is not listed in the CISA KEV catalog. The likely attack vector is a rogue base station that a UE connects to; exploitation requires victim interaction but no additional access.
OpenCVE Enrichment