2024-04-01 04:03:28 +00:00
{
"id" : "CVE-2024-20055" ,
"sourceIdentifier" : "security@mediatek.com" ,
"published" : "2024-04-01T03:15:08.640" ,
2025-04-23 14:03:52 +00:00
"lastModified" : "2025-04-23T13:46:52.570" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-04-01 04:03:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In imgsys, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation Patch ID: ALPS08518692; Issue ID: MSV-1012."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "En imgsys, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n ID del parche: ALPS08518692; ID del problema: MSV-1012."
2024-04-01 04:03:28 +00:00
}
] ,
2025-03-26 21:03:49 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" ,
"baseScore" : 6.3 ,
"baseSeverity" : "MEDIUM" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "NONE"
} ,
"exploitabilityScore" : 1.0 ,
"impactScore" : 5.2
}
]
} ,
"weaknesses" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
}
] ,
2025-04-23 14:03:52 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "437D8F9D-67DF-47A5-9C96-5B51D1562951"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mediatek:iot_yocto:23.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC6EF24A-37C2-4BFD-BF05-79089E74910C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7D1135F9-E38C-4308-BD32-A4D83959282E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3CE2FC35-716A-4706-97BA-5DB165041580"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4452EFCF-5733-40A0-8726-F8E33E569411"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "582F1041-CD84-4763-AD6F-E08DD11F689F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED210E64-6CE7-42B1-849E-68C0E22521F6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA2B6BB9-7544-41A7-BF3A-344AA4CC4B31"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "152F6606-FA23-4530-AA07-419866B74CB3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26573298-76BC-49FE-8D99-CF03ED01B185"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "533284E5-C3AF-48D3-A287-993099DB2E41"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78D4E9E1-B044-41EC-BE98-22DC0E5E9010"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E1F80793-01B7-403A-A5F4-031F82FAC77A"
}
]
}
]
}
] ,
2024-04-01 04:03:28 +00:00
"references" : [
{
"url" : "https://corp.mediatek.com/product-security-bulletin/April-2024" ,
2025-04-23 14:03:52 +00:00
"source" : "security@mediatek.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://corp.mediatek.com/product-security-bulletin/April-2024" ,
2025-04-23 14:03:52 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-04-01 04:03:28 +00:00
}
]
}