Lucene search

K
vulnrichmentMediaTekVULNRICHMENT:CVE-2024-20003
HistoryFeb 05, 2024 - 5:59 a.m.

CVE-2024-20003

2024-02-0505:59:33
MediaTek
github.com
3
modem nl1
remote denial of service
input validation

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981).

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6875t",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt2735",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6297:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6297",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6833",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6853",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6855",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6873",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6875",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6877",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6880",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6883",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6885",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6889",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6890",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6891",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6893",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8675",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8791",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8791t",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8797",
    "versions": [
      {
        "status": "affected",
        "version": "-"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20003