6.6
CVE-2024-20028
- EPSS 0.06%
- Published 04.03.2024 03:15:07
- Last modified 22.04.2025 20:37:08
- Source security@mediatek.com
- Teams watchlist Login
- Open Login
In da, there is a possible out of bounds write due to lack of valudation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541632; Issue ID: ALPS08541687.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Data is provided by the National Vulnerability Database (NVD)
Google ≫ Android Version12.0
Mediatek ≫ Mt6739 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Google ≫ Android Version13.0
Mediatek ≫ Mt6739 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Google ≫ Android Version14.0
Mediatek ≫ Mt6739 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Mediatek ≫ Mt6757 Version-
Mediatek ≫ Mt6761 Version-
Mediatek ≫ Mt6763 Version-
Mediatek ≫ Mt6765 Version-
Mediatek ≫ Mt6768 Version-
Mediatek ≫ Mt6771 Version-
Mediatek ≫ Mt6779 Version-
Mediatek ≫ Mt6785 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8163 Version-
Mediatek ≫ Mt8167 Version-
Mediatek ≫ Mt8168 Version-
Mediatek ≫ Mt8512 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.186 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.6 | 0.7 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.