First published: Mon Apr 01 2024(Updated: )
In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =3.3 | |
RDK Central RDKB | =2022q3 | |
Android | =12.0 | |
Android | =13.0 | |
Android | =14.0 | |
Open edX | =19.07.0 | |
Open edX | =21.02.0 | |
Any of | ||
MediaTek MT2713 | ||
MediaTek MT2737 | ||
MediaTek MT6781 | ||
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6879 | ||
MediaTek MT6880 | ||
MediaTek MT6886 | ||
MediaTek MT6890 | ||
MediaTek MT6895 | ||
MediaTek MT6980D | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
MediaTek MT6990 | ||
MediaTek MT8167 | ||
MediaTek MT8168 | ||
MediaTek MT8173 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8321 | ||
MediaTek MT8362A Firmware | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8390 | ||
MediaTek MT8395 | ||
MediaTek MT8666 | ||
MediaTek MT8667 | ||
MediaTek MT8673 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8791T | ||
MediaTek MT8796 | ||
MediaTek MT8797 WiFi | ||
MediaTek MT8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20050 has a moderate severity due to possible information disclosure resulting from an uncaught exception.
To fix CVE-2024-20050, apply the patch provided by the vendor with Patch ID ALPS08541757.
CVE-2024-20050 affects specific versions of Yocto Project 3.3, RDK Central RDKB 2022q3, and Android versions 12.0, 13.0, and 14.0.
No, user interaction is not required for the exploitation of CVE-2024-20050.
Exploitation of CVE-2024-20050 requires system execution privileges.