In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
History

Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Jun 2025 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Mon, 02 Jun 2025 03:15:00 +0000

Type Values Removed Values Added
Description In ims service, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01394606; Issue ID: MSV-2739.
Weaknesses CWE-674
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published: 2025-06-02T02:29:47.843Z

Updated: 2025-06-02T15:46:17.386Z

Reserved: 2024-11-01T01:21:50.371Z

Link: CVE-2025-20678

cve-icon Vulnrichment

Updated: 2025-06-02T15:14:55.788Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-02T03:15:25.230

Modified: 2025-06-02T17:32:17.397

Link: CVE-2025-20678

cve-icon Redhat

No data.