First published: Mon Jan 06 2025(Updated: )
In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =4.0 | |
RDK Central RDKB | =2022q3 | |
RDK Central RDKB | =2024q1 | |
Android | =12.0 | |
Android | =13.0 | |
Android | =14.0 | |
Android | =15.0 | |
Open edX | =19.07.0 | |
Open edX | =21.02.0 | |
Open edX | =23.05 | |
Any of | ||
MediaTek MT2737 | ||
MediaTek MT6781 | ||
MediaTek M6789 | ||
MediaTek MT6835 | ||
MediaTek MT6855 | ||
MediaTek MT6878 | ||
MediaTek MT6879 | ||
MediaTek MT6880 | ||
MediaTek MT6886 | ||
MediaTek MT6890 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6980D | ||
MediaTek MT6983 | ||
MediaTek MT6985T | ||
MediaTek MT6989 | ||
MediaTek MT6990 | ||
MediaTek MT8370 | ||
MediaTek MT8390 | ||
MediaTek MT8676 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20143 is considered a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2024-20143, apply the security patch identified as ALPS09167056 from the vendor.
CVE-2024-20143 affects devices running Google Android that have the vulnerability present.
Yes, user interaction is needed for the exploitation of CVE-2024-20143.
No, CVE-2024-20143 requires physical access to the device for exploitation.