Lucene search

K
vulnrichmentMediaTekVULNRICHMENT:CVE-2024-20089
HistorySep 02, 2024 - 2:07 a.m.

CVE-2024-20089

2024-09-0202:07:37
CWE-703
MediaTek
github.com
2
denial of service
wlan
incorrect error handling
remote
exploitation
patch id
issue id
user interaction

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6835",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6878",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6886",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6897",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6980",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6985",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6989",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt6990",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8678",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8775",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8792",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*"
    ],
    "vendor": "mediatek",
    "product": "mt8796",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "*"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
      "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
    ],
    "vendor": "google",
    "product": "android",
    "versions": [
      {
        "status": "affected",
        "version": "13.0"
      },
      {
        "status": "affected",
        "version": "14.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:linuxfoundation:yocto:2.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*"
    ],
    "vendor": "linuxfoundation",
    "product": "yocto",
    "versions": [
      {
        "status": "affected",
        "version": "2.6"
      },
      {
        "status": "affected",
        "version": "3.3"
      },
      {
        "status": "affected",
        "version": "4.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7

Confidence

High

EPSS

0.001

Percentile

17.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-20089