Platform
linux
Component
mediatek-chipset
Fixed in
6813.0.1
6815.0.1
6835.0.1
6878.0.1
6897.0.1
6899.0.1
6986.0.1
6991.0.1
6993.0.1
8668.0.1
8676.0.1
8678.0.1
8755.0.1
8775.0.1
8792.0.1
8793.0.1
8863.0.1
8873.0.1
8883.0.1
CVE-2026-20431 describes a Denial of Service vulnerability discovered in the MediaTek Chipset Modem. This flaw stems from a logic error that can trigger a system crash, potentially leading to a remote DoS condition. The vulnerability affects devices utilizing the MT6813 and MT8883 chipsets and can be exploited by connecting to a malicious base station. A patch (MOLY01106496) is available to address this issue.
CVE-2026-20431 affects MediaTek chipsets, presenting a logic error in the modem that can lead to a system crash. This vulnerability is particularly concerning as it can be exploited remotely, allowing an attacker to cause a denial-of-service (DoS) by controlling a rogue base station to which a user device (UE) connects. The severity stems from the fact that no additional execution privileges are required to exploit it, and user interaction is not needed, making exploitation relatively straightforward. The associated patch ID is MOLY01106496 and the issue ID MSV-4467. While no fix is currently available, awareness of this vulnerability and monitoring MediaTek security updates is crucial.
The vulnerability is exploited when a UE (User Equipment) connects to a malicious base station controlled by an attacker. The attacker can leverage the logic error in the modem to cause a system crash on the UE device, resulting in a denial of service. Connection to the rogue base station is the primary attack vector. Given that no additional execution privileges are required and no user interaction is needed, exploitation is relatively simple for an attacker with the resources to set up and control a rogue base station. The lack of a patch available increases the risk of exploitation.
Exploit Status
EPSS
0.06% (19% percentile)
Currently, no fix is available for CVE-2026-20431. The primary mitigation is to be extremely cautious when connecting to public or unknown Wi-Fi networks. Avoid connecting to base stations that appear suspicious or offer services that seem too good to be true. Keep your device software updated, as future updates may include patches for this vulnerability. Consider using a VPN to encrypt your network traffic and protect against potential attacks. Monitor official MediaTek security sources for information on potential solutions or updates.
Aplique la actualización de seguridad proporcionada por MediaTek (Patch ID: MOLY01106496) para mitigar la vulnerabilidad de denegación de servicio. Consulte el Boletín de Seguridad de MediaTek de abril de 2026 para obtener más detalles e instrucciones de implementación.
Vulnerability analysis and critical alerts directly to your inbox.
It's a wireless network base station that presents itself as a legitimate network but is controlled by an attacker for malicious purposes.
It's difficult to determine. Look for suspicious network names, weak security passwords, or services that seem too good to be true. Use a VPN for added security.
Immediately disconnect from the suspicious network and restart your device. Monitor your device for unusual activity.
Currently, no solution is available, but it's recommended to monitor official MediaTek security sources for updates.
It's a unique identifier for this security vulnerability, allowing security professionals to track and manage the issue.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.