Vulnerability identifier: #VU86133
Vulnerability risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-20011
CWE-ID:
CWE-787
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
MT6985
Mobile applications /
Mobile firmware & hardware
MT8127
Mobile applications /
Mobile firmware & hardware
MT8135
Mobile applications /
Mobile firmware & hardware
MT8167
Mobile applications /
Mobile firmware & hardware
MT8167S
Mobile applications /
Mobile firmware & hardware
MT8168
Mobile applications /
Mobile firmware & hardware
MT8173
Mobile applications /
Mobile firmware & hardware
MT8175
Mobile applications /
Mobile firmware & hardware
MT8176
Mobile applications /
Mobile firmware & hardware
MT8183
Mobile applications /
Mobile firmware & hardware
MT8185
Mobile applications /
Mobile firmware & hardware
MT8188
Mobile applications /
Mobile firmware & hardware
MT8188T
Mobile applications /
Mobile firmware & hardware
MT8195
Mobile applications /
Mobile firmware & hardware
MT8195Z
Mobile applications /
Mobile firmware & hardware
MT8312C
Mobile applications /
Mobile firmware & hardware
MT8312D
Mobile applications /
Mobile firmware & hardware
Vendor: MediaTek
Description
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within alac decoder. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
MT6985: All versions
MT8127: All versions
MT8135: All versions
MT8167: All versions
MT8167S: All versions
MT8168: All versions
MT8173: All versions
MT8175: All versions
MT8176: All versions
MT8183: All versions
MT8185: All versions
MT8188: All versions
MT8188T: All versions
MT8195: All versions
MT8195Z: All versions
MT8312C: All versions
MT8312D: All versions
External links
https://corp.mediatek.com/product-security-bulletin/February-2024
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.