CVE-2026-20421
📋 TL;DR
This vulnerability allows remote attackers to cause a system crash (denial of service) in affected modem devices by connecting to a rogue base station. It affects devices using MediaTek modems with improper input validation. No user interaction or special privileges are required for exploitation.
💻 Affected Systems
- MediaTek modem chipsets
⚠️ Risk & Real-World Impact
Worst Case
Complete modem/system crash requiring device reboot, potentially disrupting all cellular connectivity and dependent services.
Likely Case
Temporary denial of service affecting cellular connectivity until device reboots or reconnects to legitimate base station.
If Mitigated
No impact if patched or if device cannot connect to rogue base stations due to network controls.
🎯 Exploit Status
Requires attacker to operate rogue base station in proximity to target, but no authentication or user interaction needed once device connects.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patch ID: MOLY01738293
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/February-2026
Restart Required: Yes
Instructions:
1. Check with device manufacturer for firmware updates. 2. Apply MediaTek patch MOLY01738293. 3. Reboot device after update.
🔧 Temporary Workarounds
Disable automatic network selection
androidManually select trusted network operators to prevent automatic connection to rogue base stations.
Settings > Network & Internet > Mobile network > Network operators > Choose manually
Enable airplane mode in untrusted areas
androidTemporarily disable cellular radio when in locations where rogue base stations might operate.
Settings > Network & Internet > Airplane mode
🧯 If You Can't Patch
- Implement network monitoring for unusual base station connections
- Restrict device usage in high-risk areas where rogue base stations could operate
🔍 How to Verify
Check if Vulnerable:
Check modem firmware version against patch bulletin; if patch MOLY01738293 is not applied, device is vulnerable.
Check Version:
adb shell getprop | grep gsm.version.baseband (for Android devices)
Verify Fix Applied:
Verify patch MOLY01738293 is installed in modem firmware version information.
📡 Detection & Monitoring
Log Indicators:
- Modem crash logs
- Unexpected base station ID changes
- Frequent cellular disconnections
Network Indicators:
- Devices connecting to base stations with unusual IDs or locations
- Sudden loss of cellular connectivity patterns
SIEM Query:
source="modem_logs" AND (event="crash" OR event="disconnect") AND base_station_id NOT IN trusted_list