2024-10-10 20:03:17 +00:00

142 lines
4.5 KiB
JSON

{
"id": "CVE-2024-20102",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.427",
"lastModified": "2024-10-10T18:20:31.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601."
},
{
"lang": "es",
"value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota con privilegios de ejecuci\u00f3n de System necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998892; ID de problema: MSV-1601."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F897E19-008E-4DC8-B4CB-BF27044B9F5C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05525018-AFE0-415C-A71C-A77922C7D637"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152A5F3D-8004-4649-BDB1-E6F0798AF1CB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFAADB1-C2B2-47A6-BB66-761B964E7DFB"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
}
]
}