In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
History

Mon, 21 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Linuxfoundation
Linuxfoundation yocto
Mediatek
Mediatek mt2737
Mediatek mt3603
Mediatek mt6835
Mediatek mt6878
Mediatek mt6886
Mediatek mt6897
Mediatek mt6990
Mediatek mt7902
Mediatek mt7920
Mediatek mt7922
Mediatek mt8518s
Mediatek mt8532
Mediatek mt8755
Mediatek mt8766
Mediatek mt8768
Mediatek mt8775
Mediatek mt8781
Mediatek mt8796
Mediatek mt8798
Mediatek mt8893
Mediatek software Development Kit
Openwrt
Openwrt openwrt
CPEs cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt3603:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7920:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt7922:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*
Vendors & Products Google
Google android
Linuxfoundation
Linuxfoundation yocto
Mediatek
Mediatek mt2737
Mediatek mt3603
Mediatek mt6835
Mediatek mt6878
Mediatek mt6886
Mediatek mt6897
Mediatek mt6990
Mediatek mt7902
Mediatek mt7920
Mediatek mt7922
Mediatek mt8518s
Mediatek mt8532
Mediatek mt8755
Mediatek mt8766
Mediatek mt8768
Mediatek mt8775
Mediatek mt8781
Mediatek mt8796
Mediatek mt8798
Mediatek mt8893
Mediatek software Development Kit
Openwrt
Openwrt openwrt

Mon, 06 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Jan 2025 03:30:00 +0000

Type Values Removed Values Added
Description In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
Weaknesses CWE-617
References

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2025-01-06T14:12:39.277Z

Reserved: 2023-11-02T13:35:35.188Z

Link: CVE-2024-20152

cve-icon Vulnrichment

Updated: 2025-01-06T14:12:29.047Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-06T04:15:07.527

Modified: 2025-04-21T17:12:10.883

Link: CVE-2024-20152

cve-icon Redhat

No data.