First published: Mon Mar 04 2024(Updated: )
In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Mediatek Linkit Software Development Kit | <=7.4.0.1 | |
Any of | ||
MediaTek MT7622 Firmware | ||
mediatek mt7915 firmware | ||
All of | ||
Mediatek Linkit Software Development Kit | <=7.6.7.0 | |
Any of | ||
MediaTek MT7916 Firmware | ||
MediaTek MT7981 Firmware | ||
MediaTek MT7986 | ||
All of | ||
Any of | ||
Open edX | =19.07.0 | |
Open edX | =21.02.0 | |
MediaTek MT6890 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20017 is classified as a critical vulnerability due to its potential for remote code execution without any required user interaction.
To mitigate CVE-2024-20017, it is recommended to apply the security patches identified in the vendor's product security bulletin.
Exploitation of CVE-2024-20017 could lead to unauthorized remote code execution, allowing attackers to take control of vulnerable devices.
CVE-2024-20017 affects several MediaTek software development kits and specific firmware versions, particularly those related to wireless technologies.
No, exploiting CVE-2024-20017 does not require any user interaction, making it particularly dangerous.