In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/February-2026 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
03 Feb 2026, 21:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Mediatek mt6883
Mediatek mt6890 Mediatek mt6893 Mediatek mt6877 Mediatek mt6833 Mediatek mt8791 Mediatek mt6880 Mediatek mt6875 Mediatek Mediatek mt6885 Mediatek mt2735 Mediatek mt6855 Mediatek mt6853 Mediatek mt6873 Mediatek nr15 Mediatek mt6889 Mediatek mt6891 |
|
| References | () https://corp.mediatek.com/product-security-bulletin/February-2026 - Vendor Advisory | |
| CPE | cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:o:mediatek:nr15:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* |
Information
Published : 2026-02-02 09:15
Updated : 2026-02-03 21:23
NVD link : CVE-2026-20421
Mitre link : CVE-2026-20421
CVE.ORG link : CVE-2026-20421
JSON object : View
Products Affected
mediatek
- mt6890
- mt6891
- mt6893
- mt6855
- mt6880
- mt6833
- mt2735
- nr15
- mt6885
- mt6877
- mt8791
- mt6889
- mt6853
- mt6883
- mt6873
- mt6875
CWE
CWE-125
Out-of-bounds Read
