Vulnerability identifier: #VU91038
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-20067
CWE-ID:
CWE-787
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
MT6813
Mobile applications /
Mobile firmware & hardware
MT6815
Mobile applications /
Mobile firmware & hardware
MT6835
Mobile applications /
Mobile firmware & hardware
MT6878
Mobile applications /
Mobile firmware & hardware
MT6897
Mobile applications /
Mobile firmware & hardware
MT6899
Mobile applications /
Mobile firmware & hardware
MT6986
Mobile applications /
Mobile firmware & hardware
MT6986D
Mobile applications /
Mobile firmware & hardware
MT6991
Mobile applications /
Mobile firmware & hardware
MT8792
Mobile applications /
Mobile firmware & hardware
Vendor: MediaTek
Description
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to improper input invalidation within Modem. A local application can perform service disruption.
Mitigation
Install security update from vendor's website.
Vulnerable software versions
MT6813: All versions
MT6815: All versions
MT6835: All versions
MT6878: All versions
MT6897: All versions
MT6899: All versions
MT6986: All versions
MT6986D: All versions
MT6991: All versions
MT8792: All versions
External links
https://corp.mediatek.com/product-security-bulletin/June-2024
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.