2024-09-02 10:03:18 +00:00
{
"id" : "CVE-2024-20089" ,
"sourceIdentifier" : "security@mediatek.com" ,
"published" : "2024-09-02T05:15:15.277" ,
2024-09-05 16:03:16 +00:00
"lastModified" : "2024-09-05T14:28:02.713" ,
"vulnStatus" : "Analyzed" ,
2024-09-02 10:03:18 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526."
2024-09-03 14:03:47 +00:00
} ,
{
"lang" : "es" ,
"value" : "En WLAN, existe una posible denegaci\u00f3n de servicio debido a un manejo incorrecto de errores. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08861558; ID de problema: MSV-1526."
2024-09-02 10:03:18 +00:00
}
] ,
2024-09-03 16:03:22 +00:00
"metrics" : {
"cvssMetricV31" : [
2024-09-05 16:03:16 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2024-09-05 16:03:16 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-09-05 16:03:16 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
} ,
2024-09-03 16:03:22 +00:00
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2024-09-03 16:03:22 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-09-03 16:03:22 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
]
} ,
2024-09-02 10:03:18 +00:00
"weaknesses" : [
2024-09-05 16:03:16 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security@mediatek.com" ,
"type" : "Secondary" ,
2024-09-05 16:03:16 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-703"
2024-09-05 16:03:16 +00:00
}
]
} ,
2024-09-02 10:03:18 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2024-09-02 10:03:18 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-754"
2024-09-02 10:03:18 +00:00
}
]
2024-09-03 16:03:22 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-754"
}
]
2024-09-02 10:03:18 +00:00
}
] ,
2024-09-05 16:03:16 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "397C75CA-D217-4617-B8B1-80F74CFB04CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "437D8F9D-67DF-47A5-9C96-5B51D1562951"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A1488152-CC93-40DF-8D1F-BF33DC8444FF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "19A63103-C708-48EC-B44D-5E465A6B79C5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "855A8046-34ED-4891-ACE5-76AB10AC8D53"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A7D8055-F4B6-41EE-A078-11D56285AB66"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE5FB550-7264-4879-BAF9-6798949113AF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
}
]
}
]
}
] ,
2024-09-02 10:03:18 +00:00
"references" : [
{
"url" : "https://corp.mediatek.com/product-security-bulletin/September-2024" ,
2024-09-05 16:03:16 +00:00
"source" : "security@mediatek.com" ,
"tags" : [
"Vendor Advisory"
]
2024-09-02 10:03:18 +00:00
}
]
}