Vulnerability identifier: #VU102351
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-20152
CWE-ID:
CWE-617
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
MT2737
Mobile applications /
Mobile firmware & hardware
MT3603
Mobile applications /
Mobile firmware & hardware
MT6835
Mobile applications /
Mobile firmware & hardware
MT6878
Mobile applications /
Mobile firmware & hardware
MT6886
Mobile applications /
Mobile firmware & hardware
MT6897
Mobile applications /
Mobile firmware & hardware
MT6990
Mobile applications /
Mobile firmware & hardware
MT7902
Mobile applications /
Mobile firmware & hardware
MT7920
Mobile applications /
Mobile firmware & hardware
MT7922
Mobile applications /
Mobile firmware & hardware
MT8532
Mobile applications /
Mobile firmware & hardware
MT8755
Mobile applications /
Mobile firmware & hardware
MT8766
Mobile applications /
Mobile firmware & hardware
MT8768
Mobile applications /
Mobile firmware & hardware
MT8775
Mobile applications /
Mobile firmware & hardware
MT8781
Mobile applications /
Mobile firmware & hardware
MT8796
Mobile applications /
Mobile firmware & hardware
MT8798
Mobile applications /
Mobile firmware & hardware
MT8893
Mobile applications /
Mobile firmware & hardware
MT8518S
Vendor: MediaTek
Description
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to improper exception handling within wlan. A local application can perform service disruption.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
MT2737: All versions
MT3603: All versions
MT6835: All versions
MT6878: All versions
MT6886: All versions
MT6897: All versions
MT6990: All versions
MT7902: All versions
MT7920: All versions
MT7922: All versions
MT8518S: All versions
MT8532: All versions
MT8755: All versions
MT8766: All versions
MT8768: All versions
MT8775: All versions
MT8781: All versions
MT8796: All versions
MT8798: All versions
MT8893: All versions
External links
https://corp.mediatek.com/product-security-bulletin/January-2025
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.