2024-10-07 04:03:16 +00:00
{
"id" : "CVE-2024-20100" ,
"sourceIdentifier" : "security@mediatek.com" ,
"published" : "2024-10-07T03:15:03.273" ,
2025-04-25 20:03:54 +00:00
"lastModified" : "2025-04-25T18:36:53.990" ,
"vulnStatus" : "Analyzed" ,
2024-10-07 04:03:16 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603."
2024-10-13 02:03:17 +00:00
} ,
{
"lang" : "es" ,
"value" : "En el controlador WLAN, existe una posible escritura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998449; ID de problema: MSV-1603."
2024-10-07 04:03:16 +00:00
}
] ,
2024-10-07 20:03:18 +00:00
"metrics" : {
"cvssMetricV31" : [
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
2024-10-07 20:03:18 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-10-07 20:03:18 +00:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 5.9
}
]
} ,
2024-10-07 04:03:16 +00:00
"weaknesses" : [
{
"source" : "security@mediatek.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
2025-04-25 20:03:54 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mediatek:iot_yocto:24.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "21917FFD-A4EA-43A2-BE2C-FB9B24ECDDB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "3.3" ,
"matchCriteriaId" : "717EE6D8-BCB9-4F8B-AC18-5B2CD6F847CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "879FFD0C-9B38-4CAA-B057-1086D794D469"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F897E19-008E-4DC8-B4CB-BF27044B9F5C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "05525018-AFE0-415C-A71C-A77922C7D637"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8512:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3E51B721-CBDD-4223-ACD1-509E82D1B4A2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EE302F6F-170E-4350-A8F4-65BE0C50CB78"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B5126E05-25DC-4EF7-8DDE-BBA38A7547FB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8698:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A8B1C43-5770-440F-8015-3BBBD7AF8386"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1CF88096-5CBD-4A4B-8F47-33D38985956F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE5FB550-7264-4879-BAF9-6798949113AF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "336FC69E-E89F-4642-B6B9-8009D9A2BD52"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
}
]
}
]
2024-10-07 04:03:16 +00:00
}
] ,
"references" : [
{
"url" : "https://corp.mediatek.com/product-security-bulletin/October-2024" ,
2025-04-25 20:03:54 +00:00
"source" : "security@mediatek.com" ,
"tags" : [
"Vendor Advisory"
]
2024-10-07 04:03:16 +00:00
}
]
}