{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20098","assignerOrgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","state":"PUBLISHED","assignerShortName":"MediaTek","dateReserved":"2023-11-02T13:35:35.175Z","datePublished":"2024-10-07T02:35:25.007Z","dateUpdated":"2024-10-07T13:30:22.248Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","shortName":"MediaTek","dateUpdated":"2024-10-07T02:35:25.007Z"},"descriptions":[{"lang":"en","value":"In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626."}],"affected":[{"vendor":"MediaTek, Inc.","product":"MT6768, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8188, MT8532, MT8675, MT8766, MT8768, MT8781, MT8786, MT8788","versions":[{"version":"Android 12.0, 15.0 / Yocto 4.0","status":"affected"}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/October-2024"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write"}]}]},"adp":[{"affected":[{"vendor":"mediatek","product":"mt6768","cpes":["cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6779","cpes":["cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6781","cpes":["cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6785","cpes":["cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6833","cpes":["cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6853","cpes":["cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6873","cpes":["cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6877","cpes":["cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6885","cpes":["cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6893","cpes":["cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8188","cpes":["cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8532","cpes":["cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8675","cpes":["cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8766","cpes":["cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8768","cpes":["cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8781","cpes":["cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8786","cpes":["cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8788","cpes":["cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.7,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-10-07T13:29:16.444318Z","id":"CVE-2024-20098","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-07T13:30:22.248Z"}}]}}