In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/February-2024 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/February-2024 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory |
09 Feb 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-787 | |
First Time |
Mediatek mt5695
Mediatek mt9671 Mediatek mt9286 Mediatek Mediatek mt9632 Mediatek mt9629 Mediatek mt9255 Mediatek mt9667 Mediatek mt9020 Mediatek mt9652 Google android Mediatek mt9650 Mediatek mt9603 Mediatek mt9631 Mediatek mt9675 Mediatek mt9610 Mediatek mt9630 Mediatek mt9220 Mediatek mt9025 Mediatek mt5583 Mediatek mt9653 Mediatek mt9222 Mediatek mt9669 Mediatek mt5586 Mediatek mt9256 Mediatek mt9617 Mediatek mt9266 Mediatek mt9638 Mediatek mt9686 Mediatek mt9666 Mediatek mt9636 Mediatek mt9615 Mediatek mt9685 Mediatek mt9633 Mediatek mt9016 Mediatek mt9649 Mediatek mt9602 Mediatek mt9688 Mediatek mt9618 Mediatek mt9216 Mediatek mt9612 Mediatek mt5696 Mediatek mt9679 Mediatek mt9660 Mediatek mt9015 Mediatek mt9026 Mediatek mt9221 Mediatek mt5691 Mediatek mt9021 Mediatek mt9022 Mediatek mt9611 Mediatek mt9288 Mediatek mt9639 Mediatek mt9011 Mediatek mt9010 Mediatek mt9218 Mediatek mt9689 Mediatek mt9269 Mediatek mt9613 Mediatek mt9012 |
|
References | () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
CPE | cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:* |
05 Feb 2024, 13:54
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Feb 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-05 06:15
Updated : 2024-11-21 08:51
NVD link : CVE-2024-20002
Mitre link : CVE-2024-20002
CVE.ORG link : CVE-2024-20002
JSON object : View
Products Affected
mediatek
- mt9255
- mt9686
- mt9649
- mt5586
- mt9216
- mt9633
- mt9618
- mt9667
- mt9652
- mt9679
- mt9689
- mt9613
- mt9671
- mt9256
- mt9636
- mt9675
- mt5695
- mt5691
- mt9010
- mt9685
- mt9022
- mt9025
- mt9612
- mt9012
- mt9629
- mt9632
- mt9218
- mt9610
- mt9666
- mt9638
- mt9669
- mt9630
- mt9653
- mt9221
- mt9650
- mt9266
- mt9286
- mt9269
- mt9288
- mt9603
- mt9222
- mt5696
- mt9015
- mt9660
- mt9021
- mt9631
- mt9602
- mt9011
- mt9020
- mt9611
- mt9220
- mt5583
- mt9639
- mt9615
- mt9026
- mt9688
- mt9617
- mt9016
- android
CWE
CWE-787
Out-of-bounds Write