CVE-2024-20002

In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961715; Issue ID: DTV03961715.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*

History

09 Feb 2024, 02:01

Type Values Removed Values Added
CWE CWE-787
First Time Mediatek mt5696
Mediatek mt9221
Mediatek mt9650
Mediatek mt9610
Mediatek mt5583
Mediatek mt9636
Mediatek mt9026
Mediatek mt9010
Mediatek mt9612
Mediatek mt9269
Mediatek mt9675
Mediatek mt9288
Mediatek mt9686
Mediatek mt9216
Mediatek mt9669
Mediatek mt9679
Mediatek mt9256
Mediatek mt9632
Mediatek mt9286
Mediatek
Mediatek mt9603
Mediatek mt9016
Mediatek mt9022
Mediatek mt9649
Mediatek mt9613
Mediatek mt9025
Mediatek mt9667
Mediatek mt9255
Mediatek mt9685
Mediatek mt9660
Mediatek mt9638
Mediatek mt9630
Mediatek mt9602
Mediatek mt9653
Mediatek mt9689
Mediatek mt9671
Mediatek mt9652
Mediatek mt9633
Mediatek mt9631
Mediatek mt9639
Mediatek mt9012
Mediatek mt9617
Mediatek mt9222
Mediatek mt9615
Mediatek mt9266
Mediatek mt9218
Google android
Mediatek mt9011
Mediatek mt9629
Google
Mediatek mt9688
Mediatek mt5695
Mediatek mt9611
Mediatek mt9666
Mediatek mt9020
Mediatek mt9015
Mediatek mt5691
Mediatek mt9021
Mediatek mt5586
Mediatek mt9220
Mediatek mt9618
References () https://corp.mediatek.com/product-security-bulletin/February-2024 - () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory
CPE cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

05 Feb 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) En TVAPI, existe una posible escritura fuera de los límites debido a una verificación de los límites faltantes. Esto podría conducir a una escalada local de privilegios con permisos de ejecución de System necesarios. La interacción del usuario no es necesaria para la explotación. ID de parche: DTV03961715; ID del problema: DTV03961715.

05 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 06:15

Updated : 2024-02-09 02:01


NVD link : CVE-2024-20002

Mitre link : CVE-2024-20002

CVE.ORG link : CVE-2024-20002


JSON object : View

Products Affected

mediatek

  • mt9612
  • mt9618
  • mt9021
  • mt9220
  • mt9022
  • mt9010
  • mt9686
  • mt9650
  • mt9610
  • mt9020
  • mt9630
  • mt9012
  • mt9617
  • mt9652
  • mt9633
  • mt9649
  • mt9671
  • mt9679
  • mt9611
  • mt9269
  • mt9639
  • mt9669
  • mt9675
  • mt9613
  • mt9602
  • mt9631
  • mt9015
  • mt9629
  • mt9603
  • mt5691
  • mt5695
  • mt9653
  • mt9638
  • mt5696
  • mt9288
  • mt9685
  • mt9286
  • mt9266
  • mt9632
  • mt9666
  • mt9016
  • mt9026
  • mt9636
  • mt9221
  • mt9667
  • mt9222
  • mt5586
  • mt9689
  • mt9256
  • mt9660
  • mt9216
  • mt9688
  • mt5583
  • mt9011
  • mt9615
  • mt9218
  • mt9255
  • mt9025

google

  • android
CWE
CWE-787

Out-of-bounds Write