Description
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01753620; Issue ID: MSV-6100.
Published: 2026-05-04
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An error handling flaw in the modem subsystem of MediaTek chipsets can cause a system crash. The defect allows a rogue base station to trigger the crash remotely without requiring user interaction or elevated privileges, resulting in a denial of service. The vulnerability is categorized as CWE-617, reflecting improper error handling.

Affected Systems

The flaw affects MediaTek, Inc. MediaTek chipsets. No specific version range is listed in the advisory, so all current and future Modem firmware on these chipsets is potentially vulnerable until the patch is applied.

Risk and Exploitability

The low EPSS score of < 1% indicates a very small likelihood of exploitation, but the lack of user interaction and the ability to cause a crash via a rogue base station suggest that attackers who control a base station can still launch a remote denial of service. The vulnerability is not listed in CISA's KEV catalog. The CVSS score of 6.5 indicates a medium severity risk for affected devices.

Generated by OpenCVE AI on May 4, 2026 at 15:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the MediaTek patch identified as MOLY01753620 to all affected devices.
  • Configure network equipment to prevent mobile users from connecting to untrusted or unknown base stations.
  • Apply any subsequent firmware or security updates provided by MediaTek in response to this issue.
  • Monitor device logs for unexpected modem crashes.

Generated by OpenCVE AI on May 4, 2026 at 15:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 15:30:00 +0000

Type Values Removed Values Added
Title Modem Crash Leading to Remote Denial of Service on MediaTek Chipsets

Mon, 04 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek, Inc.
Mediatek, Inc. mediatek Chipset
Vendors & Products Mediatek, Inc.
Mediatek, Inc. mediatek Chipset

Mon, 04 May 2026 07:45:00 +0000

Type Values Removed Values Added
Title Modem Crash Leading to Remote Denial of Service on MediaTek Chipsets

Mon, 04 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01753620; Issue ID: MSV-6100.
Weaknesses CWE-617
References

Subscriptions

Mediatek, Inc. Mediatek Chipset
cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2026-05-04T12:59:48.327Z

Reserved: 2025-11-03T01:30:59.013Z

Link: CVE-2026-20450

cve-icon Vulnrichment

Updated: 2026-05-04T12:59:34.794Z

cve-icon NVD

Status : Received

Published: 2026-05-04T07:15:59.723

Modified: 2026-05-04T14:16:32.553

Link: CVE-2026-20450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T15:15:03Z

Weaknesses