CVE-2024-20152 (GCVE-0-2024-20152)

Vulnerability from cvelistv5 – Published: 2025-01-06 03:17 – Updated: 2025-01-06 14:12
VLAI?
Summary
In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-20152",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-06T14:12:35.612710Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-06T14:12:39.277Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8755, MT8766, MT8768, MT8775, MT8781, MT8796, MT8798, MT8893",
          "vendor": "MediaTek, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-617",
              "description": "CWE-617 Reachable Assertion",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-06T03:17:59.918Z",
        "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
        "shortName": "MediaTek"
      },
      "references": [
        {
          "url": "https://corp.mediatek.com/product-security-bulletin/January-2025"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374",
    "assignerShortName": "MediaTek",
    "cveId": "CVE-2024-20152",
    "datePublished": "2025-01-06T03:17:59.918Z",
    "dateReserved": "2023-11-02T13:35:35.188Z",
    "dateUpdated": "2025-01-06T14:12:39.277Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.\"}, {\"lang\": \"es\", \"value\": \"En wlan STA driver, existe una posible aserci\\u00f3n alcanzable debido a una gesti\\u00f3n inadecuada de excepciones. Esto podr\\u00eda provocar una denegaci\\u00f3n de servicio local si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\\u00f3n del usuario para la explotaci\\u00f3n. ID de parche: WCNCR00389047 / ALPS09136505; ID de problema: MSV-1798.\"}]",
      "id": "CVE-2024-20152",
      "lastModified": "2025-01-06T15:15:13.023",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}]}",
      "published": "2025-01-06T04:15:07.527",
      "references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/January-2025\", \"source\": \"security@mediatek.com\"}]",
      "sourceIdentifier": "security@mediatek.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security@mediatek.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-617\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20152\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2025-01-06T04:15:07.527\",\"lastModified\":\"2025-04-21T17:12:10.883\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.\"},{\"lang\":\"es\",\"value\":\"En wlan STA driver, existe una posible aserci\u00f3n alcanzable debido a una gesti\u00f3n inadecuada de excepciones. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local si un actor malintencionado ya obtuvo el privilegio de System. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00389047 / ALPS09136505; ID de problema: MSV-1798.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@mediatek.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2385F2C9-3EA1-424B-AB8D-A672BF1CBE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"437D8F9D-67DF-47A5-9C96-5B51D1562951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067BC2E4-D44D-4817-861C-8596A497E183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.4\",\"matchCriteriaId\":\"5FA0981E-8869-4546-88A5-6D750549EBFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879FFD0C-9B38-4CAA-B057-1086D794D469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2700BCC5-634D-4EC6-AB67-5B678D5F951D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8538774C-906D-4B03-A3E7-FA7A55E0DA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED95D06-8EC6-4070-BE3C-E0F851D7FFC1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C2A1118-B5F7-4EF5-B329-0887B5F3430E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE21866A-505E-4526-A346-60C97DCE080B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A63103-C708-48EC-B44D-5E465A6B79C5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855A8046-34ED-4891-ACE5-76AB10AC8D53\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3E2B84-DAFE-4E11-B23B-026F719475F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7D8055-F4B6-41EE-A078-11D56285AB66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A76806D-A4E3-466A-90CB-E9FFE478E7A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DEA745-47A8-43F1-A1B2-F53F651A99EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"140DAC08-96E9-47D3-BC2E-65E999DCFD50\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA2A6813-7138-441E-A9E4-FF62FCBD797A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6069CD03-6AB1-4A06-88CF-EFBDEA84CDE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE18D5C2-0423-4CE5-86E7-69E7BB131BBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF88096-5CBD-4A4B-8F47-33D38985956F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE45F606-2E75-48BC-9D1B-99D504974CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE5FB550-7264-4879-BAF9-6798949113AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"533284E5-C3AF-48D3-A287-993099DB2E41\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE933AD9-3A6F-421B-8AB3-C45F8DEA9548\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637CAAD2-DCC0-4F81-B781-5D0536844CA8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCFAADB1-C2B2-47A6-BB66-761B964E7DFB\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/January-2025\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20152\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-06T14:12:35.612710Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-06T14:12:29.047Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"MediaTek, Inc.\", \"product\": \"MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8755, MT8766, MT8768, MT8775, MT8781, MT8796, MT8798, MT8893\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0\"}]}], \"references\": [{\"url\": \"https://corp.mediatek.com/product-security-bulletin/January-2025\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-617\", \"description\": \"CWE-617 Reachable Assertion\"}]}], \"providerMetadata\": {\"orgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"shortName\": \"MediaTek\", \"dateUpdated\": \"2025-01-06T03:17:59.918Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-20152\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-06T14:12:39.277Z\", \"dateReserved\": \"2023-11-02T13:35:35.188Z\", \"assignerOrgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"datePublished\": \"2025-01-06T03:17:59.918Z\", \"assignerShortName\": \"MediaTek\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…