First published: Mon Jun 03 2024(Updated: )
In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. Patch ID: MOLY01270721; Issue ID: MSV-1479.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
All of | ||
Any of | ||
MediaTek NR16 | ||
MediaTek NR17 | ||
Any of | ||
MediaTek MT6298 | ||
MediaTek MT6813 | ||
MediaTek MT6815 | ||
MediaTek MT6835 | ||
MediaTek MT6878 | ||
MediaTek MT6879 | ||
MediaTek MT6895 | ||
MediaTek MT6895T | ||
MediaTek MT6896 | ||
MediaTek MT6897 | ||
MediaTek MT6899 | ||
MediaTek MT6980D | ||
MediaTek MT6980D | ||
MediaTek MT6983 | ||
MediaTek MT6986 | ||
MediaTek MT6986D | ||
MediaTek MT6990 | ||
MediaTek MT6991 | ||
MediaTek MT8673 | ||
MediaTek MT8675 | ||
MediaTek MT8771 | ||
MediaTek MT8791T | ||
MediaTek MT8792 | ||
MediaTek MT8797 WiFi | ||
MediaTek MT8798 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20068 is classified as a high severity vulnerability due to the potential for remote denial of service.
To fix CVE-2024-20068, apply the patch identified as MOLY01270721 provided by the software vendor.
CVE-2024-20068 affects certain versions of Android and specific MediaTek modem chipsets such as NR16 and NR17.
No, user interaction is not required to exploit CVE-2024-20068, making it particularly dangerous.
CVE-2024-20068 enables a remote denial of service attack, potentially crashing the system.