CVE-2026-20431: MediaTek Modem DoS - Chipset Crash

Platform

linux

Component

mediatek-chipset

Fixed in

6813.0.1

6815.0.1

6835.0.1

6878.0.1

6897.0.1

6899.0.1

6986.0.1

6991.0.1

6993.0.1

8668.0.1

8676.0.1

8678.0.1

8755.0.1

8775.0.1

8792.0.1

8793.0.1

8863.0.1

8873.0.1

8883.0.1

AI Confidence: highNVDEPSS 0.1%Reviewed: Apr 2026

CVE-2026-20431 describes a Denial of Service vulnerability discovered in the MediaTek Chipset Modem. This flaw stems from a logic error that can trigger a system crash, potentially leading to a remote DoS condition. The vulnerability affects devices utilizing the MT6813 and MT8883 chipsets and can be exploited by connecting to a malicious base station. A patch (MOLY01106496) is available to address this issue.

Impact and Attack Scenarios

CVE-2026-20431 affects MediaTek chipsets, presenting a logic error in the modem that can lead to a system crash. This vulnerability is particularly concerning as it can be exploited remotely, allowing an attacker to cause a denial-of-service (DoS) by controlling a rogue base station to which a user device (UE) connects. The severity stems from the fact that no additional execution privileges are required to exploit it, and user interaction is not needed, making exploitation relatively straightforward. The associated patch ID is MOLY01106496 and the issue ID MSV-4467. While no fix is currently available, awareness of this vulnerability and monitoring MediaTek security updates is crucial.

Exploitation Context

The vulnerability is exploited when a UE (User Equipment) connects to a malicious base station controlled by an attacker. The attacker can leverage the logic error in the modem to cause a system crash on the UE device, resulting in a denial of service. Connection to the rogue base station is the primary attack vector. Given that no additional execution privileges are required and no user interaction is needed, exploitation is relatively simple for an attacker with the resources to set up and control a rogue base station. The lack of a patch available increases the risk of exploitation.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Reports1 threat report

EPSS

0.06% (19% percentile)

Affected Software

Componentmediatek-chipset
VendorMediaTek, Inc.
Affected rangeFixed in
MT6813 – MT68136813.0.1
MT6815 – MT68156815.0.1
MT6835 – MT68356835.0.1
MT6878 – MT68786878.0.1
MT6897 – MT68976897.0.1
MT6899 – MT68996899.0.1
MT6986 – MT69866986.0.1
MT6991 – MT69916991.0.1
MT6993 – MT69936993.0.1
MT8668 – MT86688668.0.1
MT8676 – MT86768676.0.1
MT8678 – MT86788678.0.1
MT8755 – MT87558755.0.1
MT8775 – MT87758775.0.1
MT8792 – MT87928792.0.1
MT8793 – MT87938793.0.1
MT8863 – MT88638863.0.1
MT8873 – MT88738873.0.1
MT8883 – MT88838883.0.1

Weakness Classification (CWE)

Timeline

  1. Reserved
  2. Published
  3. EPSS updated
Unpatched — 47 days since disclosure

Mitigation and Workarounds

Currently, no fix is available for CVE-2026-20431. The primary mitigation is to be extremely cautious when connecting to public or unknown Wi-Fi networks. Avoid connecting to base stations that appear suspicious or offer services that seem too good to be true. Keep your device software updated, as future updates may include patches for this vulnerability. Consider using a VPN to encrypt your network traffic and protect against potential attacks. Monitor official MediaTek security sources for information on potential solutions or updates.

How to fix

Aplique la actualización de seguridad proporcionada por MediaTek (Patch ID: MOLY01106496) para mitigar la vulnerabilidad de denegación de servicio. Consulte el Boletín de Seguridad de MediaTek de abril de 2026 para obtener más detalles e instrucciones de implementación.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2026-20431 — Denial of Service (DoS) in MediaTek Chipset Modem?

It's a wireless network base station that presents itself as a legitimate network but is controlled by an attacker for malicious purposes.

Am I affected by CVE-2026-20431 in MediaTek Chipset Modem?

It's difficult to determine. Look for suspicious network names, weak security passwords, or services that seem too good to be true. Use a VPN for added security.

How do I fix CVE-2026-20431 in MediaTek Chipset Modem?

Immediately disconnect from the suspicious network and restart your device. Monitor your device for unusual activity.

Is CVE-2026-20431 being actively exploited?

Currently, no solution is available, but it's recommended to monitor official MediaTek security sources for updates.

Where can I find the official MediaTek Chipset Modem advisory for CVE-2026-20431?

It's a unique identifier for this security vulnerability, allowing security professionals to track and manage the issue.

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.