cve/2024/CVE-2024-20003.md

21 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-20003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20003)
![](https://img.shields.io/static/v1?label=Product&message=MT2735%2C%20MT6297%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8791%2C%20MT8791T%2C%20MT8797&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Modem%20NR15%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial%20of%20Service&color=brighgreen)
### Description
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981).
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Shangzewen/U-Fuzz
- https://github.com/asset-group/5ghoul-5g-nr-attacks
- https://github.com/asset-group/U-Fuzz
- https://github.com/fkie-cad/nvd-json-data-feeds