cvelist/2024/20xxx/CVE-2024-20070.json

64 lines
2.5 KiB
JSON
Raw Normal View History

2023-11-02 14:00:33 +00:00
{
2024-06-03 03:00:34 +00:00
"data_version": "4.0",
2023-11-02 14:00:33 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-20070",
2024-06-03 03:00:34 +00:00
"ASSIGNER": "security@mediatek.com",
"STATE": "PUBLIC"
2023-11-02 14:00:33 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-06-03 03:00:34 +00:00
"value": "In modem, there is a possible information disclosure due to using risky cryptographic algorithm during connection establishment negotiation. This could lead to remote information disclosure, when weak encryption algorithm is used, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00942482; Issue ID: MSV-1469."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
"cweId": "CWE-327"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "MediaTek, Inc.",
"product": {
"product_data": [
{
"product_name": "MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6990, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8786, MT8791T, MT8792, MT8797, MT8798",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "Modem NR15, NR16, NR17"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/June-2024",
"refsource": "MISC",
"name": "https://corp.mediatek.com/product-security-bulletin/June-2024"
2023-11-02 14:00:33 +00:00
}
]
}
}