First published: Mon Sep 02 2024(Updated: )
In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =2.6 | |
Yocto Project | =3.3 | |
Yocto Project | =4.0 | |
RDK Central RDKB | =2022q3 | |
Android | =13.0 | |
Android | =14.0 | |
Any of | ||
MediaTek MT6835 | ||
MediaTek MT6878 | ||
MediaTek MT6886 | ||
MediaTek MT6897 | ||
MediaTek MT6980D | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
MediaTek MT6990 | ||
MediaTek MT8678 | ||
MediaTek MT8775 | ||
MediaTek MT8792 | ||
MediaTek MT8796 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20089 has a moderate severity rating due to its potential to cause a denial of service.
To fix CVE-2024-20089, apply the patch identified as ALPS08861558 provided by the affected software vendor.
CVE-2024-20089 affects specific versions of Yocto, RDK Central RDKB, and Google Android.
No, user interaction is not needed for the exploitation of CVE-2024-20089.
Yes, CVE-2024-20089 can be exploited remotely, leading to a denial of service.