ID

VAR-202602-0439


CVE

CVE-2026-20403


TITLE

media tech's NR15 Out-of-bounds write vulnerabilities in multiple products, including

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750

DESCRIPTION

In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01689254 (Note: For N15 and NR16) / MOLY01689259 (Note: For NR17 and NR17R); Issue ID: MSV-4843. Patch ID teeth MOLY01689254 (( N15 and NR16 for) and MOLY01689259 (( NR17 and NR17R (used) and the problem ID teeth MSV-4843 is.Information handled by the software will not be leaked to the outside. Information handled by the software will not be rewritten. In addition, the software may stop functioning completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-20403 // JVNDB: JVNDB-2026-002750

AFFECTED PRODUCTS

vendor:mediatekmodel:nr17rscope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr17scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr15scope:eqversion: -

Trust: 1.0

vendor:mediatekmodel:nr16scope:eqversion: -

Trust: 1.0

vendor:メディアテックmodel:nr17rscope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr17scope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr16scope: - version: -

Trust: 0.8

vendor:メディアテックmodel:nr15scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750 // NVD: CVE-2026-20403

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2026-20403
value: HIGH

Trust: 1.0

OTHER: JVNDB-2026-002750
value: HIGH

Trust: 0.8

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2026-20403
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

OTHER: JVNDB-2026-002750
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750 // NVD: CVE-2026-20403

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750 // NVD: CVE-2026-20403

PATCH

title:February 2026url:https://corp.mediatek.com/product-security-bulletin/February-2026

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750

EXTERNAL IDS

db:NVDid:CVE-2026-20403

Trust: 2.6

db:JVNDBid:JVNDB-2026-002750

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750 // NVD: CVE-2026-20403

REFERENCES

url:https://corp.mediatek.com/product-security-bulletin/february-2026

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-20403

Trust: 0.8

sources: JVNDB: JVNDB-2026-002750 // NVD: CVE-2026-20403

SOURCES

db:JVNDBid:JVNDB-2026-002750
db:NVDid:CVE-2026-20403

LAST UPDATE DATE

2026-02-12T23:50:13.079000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-002750date:2026-02-06T01:37:00
db:NVDid:CVE-2026-20403date:2026-02-04T14:23:25.057

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-002750date:2026-02-06T00:00:00
db:NVDid:CVE-2026-20403date:2026-02-02T09:15:54.963