{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20138","assignerOrgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","state":"PUBLISHED","assignerShortName":"MediaTek","dateReserved":"2023-11-02T13:35:35.183Z","datePublished":"2024-12-02T03:07:15.445Z","dateUpdated":"2024-12-02T15:47:42.348Z"},"containers":{"cna":{"providerMetadata":{"orgId":"ee979b05-11f8-4f25-a7e0-a1fa9c190374","shortName":"MediaTek","dateUpdated":"2024-12-02T03:07:15.445Z"},"descriptions":[{"lang":"en","value":"In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998291; Issue ID: MSV-1604."}],"affected":[{"vendor":"MediaTek, Inc.","product":"MT3605, MT6985, MT6989, MT6990, MT7925, MT7927, MT8195, MT8370, MT8390","versions":[{"version":"Android 13.0, 14.0, 15.0 / SDK release 3.3 and before","status":"affected"}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/December-2024"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","cweId":"CWE-125","description":"CWE-125 Out-of-bounds Read"}]}]},"adp":[{"affected":[{"vendor":"mediatek","product":"mt3605","cpes":["cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6985","cpes":["cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6989","cpes":["cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt6990","cpes":["cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt7925","cpes":["cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt7927","cpes":["cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8195","cpes":["cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8370","cpes":["cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]},{"vendor":"mediatek","product":"mt8390","cpes":["cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"*","versionType":"custom"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.5,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2024-12-02T15:47:39.336493Z","id":"CVE-2024-20138","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-02T15:47:42.348Z"}}]}}