CVE-2026-20431 | MediaTek MT8883 Base Station allocation of resources (MSV-4467 / EUVD-2026-19564)
VulDBArchived Apr 07, 2026✓ Full text saved
A vulnerability was found in MediaTek MT6813, MT6815, MT6835, MT6878, MT6897, MT6899, MT6986, MT6991, MT6993, MT8668, MT8676, MT8678, MT8755, MT8775, MT8792, MT8793, MT8863, MT8873 and MT8883 . It has been rated as critical . This impacts an unknown function of the component Base Station Handler . This manipulation causes allocation of resources. This vulnerability is registered as CVE-2026-20431 . Remote exploitation of the attack is possible. No exploit is available. It is suggested to install
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-355706 · CVE-2026-20431 · MSV-4467
MEDIATEK MT8883 BASE STATION ALLOCATION OF RESOURCES
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
7.2 $0-$5k 1.95+
Summaryinfo
A vulnerability categorized as critical has been discovered in MediaTek MT6813, MT6815, MT6835, MT6878, MT6897, MT6899, MT6986, MT6991, MT6993, MT8668, MT8676, MT8678, MT8755, MT8775, MT8792, MT8793, MT8863, MT8873 and MT8883. Affected is an unknown function of the component Base Station Handler. Such manipulation leads to allocation of resources. This vulnerability is documented as CVE-2026-20431. The attack can be executed remotely. There is not any exploit available. A patch should be applied to remediate this issue.
Detailsinfo
A vulnerability was found in MediaTek MT6813, MT6815, MT6835, MT6878, MT6897, MT6899, MT6986, MT6991, MT6993, MT8668, MT8676, MT8678, MT8755, MT8775, MT8792, MT8793, MT8863, MT8873 and MT8883. It has been rated as critical. Affected by this issue is an unknown functionality of the component Base Station Handler. The manipulation with an unknown input leads to a allocation of resources vulnerability. Using CWE to declare the problem leads to CWE-770. The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor. Impacted is availability. CVE summarizes:
In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01106496; Issue ID: MSV-4467.
The advisory is available at corp.mediatek.com. This vulnerability is handled as CVE-2026-20431 since 11/03/2025. The exploitation is known to be easy. The attack may be launched remotely. No form of authentication is required for exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1499 by the MITRE ATT&CK project.
Applying the patch MSV-4467 is able to eliminate this problem.
The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2026-19564).
Productinfo
Type
Chip Software
Vendor
MediaTek
Name
MT6813
MT6815
MT6835
MT6878
MT6897
MT6899
MT6986
MT6991
MT6993
MT8668
MT8676
MT8678
MT8755
MT8775
MT8792
MT8793
MT8863
MT8873
MT8883
License
commercial
CPE 2.3info
🔒
🔒
🔒
CPE 2.2info
🔒
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 7.5
VulDB Meta Temp Score: 7.2
VulDB Base Score: 7.5
VulDB Temp Score: 7.2
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Allocation of resources
CWE: CWE-770 / CWE-400 / CWE-404
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: Patch
Status: 🔍
0-Day Time: 🔒
Patch: MSV-4467
Timelineinfo
11/03/2025 CVE reserved
04/07/2026 +154 days Advisory disclosed
04/07/2026 +0 days VulDB entry created
04/07/2026 +0 days VulDB entry last update
Sourcesinfo
Advisory: MSV-4467
Status: Confirmed
CVE: CVE-2026-20431 (🔒)
GCVE (CVE): GCVE-0-2026-20431
GCVE (VulDB): GCVE-100-355706
EUVD: 🔒
Entryinfo
Created: 04/07/2026 07:21
Updated: 04/07/2026 08:30
Changes: 04/07/2026 07:21 (55), 04/07/2026 08:30 (1)
Complete: 🔍
Cache ID: 99:ACB:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸