The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-20450

CVE-2026-20450: Mediatek Mt2735 Firmware DOS Vulnerability

CVE-2026-20450 is a denial of service flaw in Mediatek Mt2735 Firmware caused by incorrect error handling in the modem. Attackers using rogue base stations can crash systems remotely. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: May 7, 2026

CVE-2026-20450 Overview

CVE-2026-20450 is a denial of service vulnerability in the MediaTek Modem component caused by incorrect error handling [CWE-617]. An attacker operating a rogue base station can trigger a system crash on a connected User Equipment (UE) device. Exploitation requires no user interaction and no additional execution privileges. The vulnerability affects a broad range of MediaTek chipsets used in smartphones, tablets, and IoT devices. MediaTek tracks this issue as MSV-6100 and resolved it with patch ID MOLY01753620, published in the May 2026 Product Security Bulletin.

Critical Impact

A nearby attacker running a rogue base station can remotely crash the modem subsystem of an affected device, disrupting cellular connectivity until the device recovers.

Affected Products

  • MediaTek modem firmware across the MT2735/MT2737, MT6xxx, and MT8xxx chipset families
  • Smartphones, tablets, and connected devices using vulnerable MediaTek baseband modems
  • Devices running modem builds prior to patch ID MOLY01753620

Discovery Timeline

  • 2026-05-04 - CVE-2026-20450 published to NVD
  • 2026-05-04 - MediaTek releases security patch via May 2026 Product Security Bulletin
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-20450

Vulnerability Analysis

The vulnerability resides in the MediaTek Modem firmware, which implements cellular protocol stacks for the affected chipsets. The flaw is classified as a reachable assertion or unreachable code path under [CWE-617], where unexpected protocol input drives the modem into an error state it does not handle correctly. When the malformed condition is reached, the modem subsystem crashes, terminating cellular service on the device.

Because exploitation occurs over the cellular radio interface, the attack vector is adjacent network and requires the victim UE to attach to attacker-controlled radio infrastructure. No authentication or user interaction is required, and confidentiality and integrity are not impacted — only availability.

Root Cause

The modem firmware fails to correctly handle a specific error condition during cellular signaling. When the modem processes the unexpected message or state from the network, the missing or improper error path triggers an abnormal termination of the modem process. MediaTek addressed the defect under issue ID MSV-6100 with patch MOLY01753620.

Attack Vector

An attacker stands up a rogue base station within radio range of the target device and induces the UE to attach. Once connected, the attacker transmits crafted signaling that drives the modem through the unhandled error path. The modem subsystem crashes, causing loss of cellular voice and data service. Recovery typically requires the modem to restart, and repeated transmission can sustain the denial-of-service condition while the victim remains in range of the rogue cell.

No public proof-of-concept code or exploit has been released for CVE-2026-20450 at the time of publication. Technical specifics are described in the MediaTek Security Bulletin May 2026.

Detection Methods for CVE-2026-20450

Indicators of Compromise

  • Repeated, unexplained modem resets or radio interface restarts on affected MediaTek-based devices
  • Sudden loss of cellular service when a device is in proximity to an unfamiliar cell tower or unknown PLMN identifier
  • Modem crash logs or kernel messages referencing the MOLY/Modem stack on devices without the May 2026 MediaTek patch

Detection Strategies

  • Inventory mobile fleet devices to identify MediaTek chipsets in scope (MT2735, MT2737, MT6xxx, MT8xxx series) and verify modem firmware build against the May 2026 patch level
  • Monitor mobile device management (MDM) telemetry for abnormal frequencies of cellular disconnects or modem reboot events
  • Use radio frequency monitoring in sensitive facilities to detect unauthorized base stations operating on commercial cellular bands

Monitoring Recommendations

  • Correlate device-side modem crash signals with location data to identify clustered failures suggesting a rogue base station
  • Track MediaTek security bulletin advisories and align device patch SLAs with vendor release cadence
  • For high-risk users, enable carrier-side anomaly detection for unusual attachment patterns to unknown cells

How to Mitigate CVE-2026-20450

Immediate Actions Required

  • Apply the MediaTek modem firmware update containing patch ID MOLY01753620 as soon as it is delivered through the device OEM
  • Identify all devices using affected MediaTek chipsets and prioritize patch deployment for high-value users and executives
  • For users in high-risk environments, restrict cellular use until firmware updates are installed or use devices on patched chipsets

Patch Information

MediaTek published the fix in the MediaTek Security Bulletin May 2026 under patch ID MOLY01753620 and issue ID MSV-6100. Device manufacturers must integrate the patched modem image into their OTA updates. Users should install the OEM update that references the May 2026 MediaTek patch level.

Workarounds

  • No vendor-supplied workaround exists; firmware patching is the only durable remediation
  • Where feasible, lock devices to trusted carrier networks and disable automatic attachment to unknown cells
  • In sensitive locations, use Faraday enclosures or RF-shielded rooms to prevent UE attachment to rogue base stations

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechMediatek

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-617
  • Vendor Resources
  • MediaTek Security Bulletin May 2026
  • Related CVEs
  • CVE-2026-20449: Mediatek Mt6763 Firmware DOS Vulnerability

  • CVE-2026-20446: Mediatek Mt6813 Firmware DOS Vulnerability

  • CVE-2026-20401: Mediatek Nr15 Modem DoS Vulnerability

  • CVE-2026-20402: Mediatek Nr15 Denial of Service Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English