First published: Mon Feb 05 2024(Updated: )
In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08477148; Issue ID: ALPS08477148.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
All of | ||
Any of | ||
RDK Central RDKB | =2022q3 | |
Google Android | =11.0 | |
OpenWrt OpenWrt | =19.07.0 | |
OpenWrt OpenWrt | =21.02.0 | |
Any of | ||
MediaTek MT2713 | ||
MediaTek MT6781 | ||
MediaTek MT6880 | ||
MediaTek MT6890 | ||
MediaTek MT8188T |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20006 is classified as a high severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2024-20006, apply the appropriate patches referenced in the release notes for the affected products.
CVE-2024-20006 affects Google Android, OpenWrt, and RDK Central RDKB systems.
No, user interaction is not needed for the exploitation of CVE-2024-20006.
Exploitation of CVE-2024-20006 could lead to local escalation of privileges, allowing attackers to gain system execution rights.