First published: Mon Apr 01 2024(Updated: )
In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08360153 (for MT6XXX chipsets) / WCNCR00363530 (for MT79XX chipsets); Issue ID: MSV-979.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
All of | ||
Any of | ||
Yocto Project | =3.3 | |
Yocto Project | =4.0 | |
RDK Central RDKB | =2022q3 | |
Android | =12.0 | |
Android | =13.0 | |
Android | =14.0 | |
Linux Kernel | =4.19 | |
Open edX | =19.07.0 | |
Open edX | =21.02.0 | |
Any of | ||
MediaTek MT2713 | ||
Mediatek MT6580 | ||
MediaTek MT6761 | ||
MediaTek MT6762M | ||
MediaTek MT6768 | ||
MediaTek MT6781 | ||
MediaTek M6789 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6853T | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6875T | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6886 | ||
MediaTek MT6889 | ||
MediaTek MT6890 | ||
MediaTek MT6891 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
MediaTek MT6990 | ||
MediaTek MT7902 | ||
mediatek mt7915 firmware | ||
MediaTek MT7916 Firmware | ||
MediaTek MT7920 | ||
MediaTek MT7921 | ||
MediaTek MT7922 | ||
Mediatek Mt7925 | ||
MediaTek MT7927 | ||
MediaTek MT7981 Firmware | ||
MediaTek MT7986 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8370 | ||
MediaTek MT8390 | ||
MediaTek MT8395 | ||
MediaTek MT8518S Firmware | ||
MediaTek MT8532 | ||
MediaTek MT8673 | ||
MediaTek MT8678 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8791T | ||
MediaTek MT8792 | ||
MediaTek MT8796 | ||
MediaTek MT8797 WiFi | ||
MediaTek MT8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20040 has a high severity due to its potential for remote privilege escalation.
To fix CVE-2024-20040, apply the available patches such as Patch ID: ALPS08360153 for MT6XXX chipsets.
CVE-2024-20040 affects devices running Google Android that utilize specific wlan firmware.
Yes, CVE-2024-20040 can be exploited remotely without any user interaction required.
The consequence of CVE-2024-20040 could lead to unauthorized escalation of privileges on affected devices.