First published: Mon Feb 05 2024(Updated: )
In Modem NL1, there is a possible system crash due to an improper input validation. This could lead to remote denial of service, if NW sent invalid NR RRC Connection Setup message, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01191612; Issue ID: MOLY01191612 (MSV-981).
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
All of | ||
MediaTek NR15 | ||
Any of | ||
MediaTek MT2735 | ||
MediaTek MT6297 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6880 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6889 | ||
MediaTek MT6890 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT8675 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8791T | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20003 is classified as a denial of service vulnerability that can lead to a system crash.
To fix CVE-2024-20003, apply the patch identified as MOLY01191612.
CVE-2024-20003 is caused by improper input validation in Modem NL1.
CVE-2024-20003 affects devices running Google Android and specific MediaTek chipsets.
No, user interaction is not needed for the exploitation of CVE-2024-20003.