6.5
CVE-2024-20069
- EPSS 0.75%
- Veröffentlicht 03.06.2024 02:15:08
- Zuletzt bearbeitet 25.04.2025 18:38:24
- Quelle security@mediatek.com
- Teams Watchlist Login
- Unerledigt Login
In modem, there is a possible selection of less-secure algorithm during the VoWiFi IKE due to a missing DH downgrade check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01286330; Issue ID: MSV-1430.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mediatek ≫ Nr15 Version-
Mediatek ≫ Mt6833 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6855 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6875 Version-
Mediatek ≫ Mt6875t Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6883 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6889 Version-
Mediatek ≫ Mt6891 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8675 Version-
Mediatek ≫ Mt8771 Version-
Mediatek ≫ Mt8791t Version-
Mediatek ≫ Mt8797 Version-
Mediatek ≫ Mt6853 Version-
Mediatek ≫ Mt6855 Version-
Mediatek ≫ Mt6873 Version-
Mediatek ≫ Mt6875 Version-
Mediatek ≫ Mt6875t Version-
Mediatek ≫ Mt6877 Version-
Mediatek ≫ Mt6883 Version-
Mediatek ≫ Mt6885 Version-
Mediatek ≫ Mt6889 Version-
Mediatek ≫ Mt6891 Version-
Mediatek ≫ Mt6893 Version-
Mediatek ≫ Mt8675 Version-
Mediatek ≫ Mt8771 Version-
Mediatek ≫ Mt8791t Version-
Mediatek ≫ Mt8797 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.75% | 0.722 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
|
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which algorithm should be used as a protection mechanism such as encryption or authentication, but it does not select the strongest algorithm that is available to both parties.