The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT, Computer Vision, Audio, and TV chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
Summary
Severity | CVEs |
---|---|
Critical | CVE-2024-20154 |
High | CVE-2024-20140, CVE-2024-20143, CVE-2024-20144, CVE-2024-20145, CVE-2024-20146, CVE-2024-20148, CVE-2024-20105 |
Medium | CVE-2024-20149, CVE-2024-20150, CVE-2024-20151, CVE-2024-20152, CVE-2024-20153 |
Details
CVE | CVE-2024-20154 |
---|---|
Title | Stack overflow in Modem |
Severity | Critical |
Vulnerability Type | RCE |
CWE | CWE-121 Stack Overflow |
Description | In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2735, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798 |
Affected Software Versions | Modem LR12A, LR13, NR15, NR16.R1.MP, NR16.R1.MP1MP2.MP, NR16.R2.MP |
Report Source | External |
CVE | CVE-2024-20140 |
---|---|
Title | Out-of-bounds write in power |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. |
Affected Chipsets | MT6739, MT6761, MT6768, MT6781, MT6833, MT6853, MT6877, MT6885, MT6893, MT8518S, MT8532 |
Affected Software Versions | Android 12.0, 13.0, 14.0, 15.0 / Yocto 3.3, 4.0, 5.0 |
Report Source | External |
CVE | CVE-2024-20143 |
---|---|
Title | Out-of-bounds write in DA |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676 |
Affected Software Versions | Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 |
Report Source | Internal |
CVE | CVE-2024-20144 |
---|---|
Title | Out-of-bounds write in DA |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT2737, MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6878, MT6879, MT6880, MT6885, MT6886, MT6890, MT6893, MT6895, MT6897, MT6980, MT6985, MT6989, MT6990, MT8370, MT8390, MT8676 |
Affected Software Versions | Android 12.0, 13.0, 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 |
Report Source | Internal |
CVE | CVE-2024-20145 |
---|---|
Title | Out-of-bounds write in DA |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. |
Affected Chipsets | MT2737, MT6781, MT6789, MT6835, MT6855, MT6878, MT6879, MT6880, MT6886, MT6890, MT6895, MT6897, MT6980, MT6983, MT6985, MT6989, MT6990, MT8676 |
Affected Software Versions | Android 14.0, 15.0 / openWRT 19.07, 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 |
Report Source | Internal |
CVE | CVE-2024-20146 |
---|---|
Title | Out-of-bounds write in wlan |
Severity | High |
Vulnerability Type | RCE |
CWE | CWE-787 Out-of-bounds Write |
Description | In wlan STA driver, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893 |
Affected Software Versions | Android 13.0, 14.0, 15.0 / SDK release 2.5 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0 |
Report Source | Internal |
CVE | CVE-2024-20148 |
---|---|
Title | Out-of-bounds write in wlan |
Severity | High |
Vulnerability Type | RCE |
CWE | CWE-787 Out-of-bounds Write |
Description | In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT3603, MT6835, MT6878, MT6886, MT6897, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8766, MT8768, MT8775, MT8796, MT8798 |
Affected Software Versions | Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / Yocto 3.3, 4.0, 5.0 |
Report Source | Internal |
CVE | CVE-2024-20105 |
---|---|
Title | Out-of-bounds write in m4u |
Severity | High |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8666, MT8667, MT8673, MT8768 |
Affected Software Versions | Android 12.0, 13.0, 14.0, 15.0 |
Report Source | External |
CVE | CVE-2024-20149 |
---|---|
Title | Specified quantity in Modem |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-1284 Specified Quantity |
Description | In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863 |
Affected Software Versions | Modem LR12A, LR13, NR15, NR16, NR17.R1, NR17.R2 |
Report Source | External |
CVE | CVE-2024-20150 |
---|---|
Title | Deserialization of untrusted data in Modem |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-502 Deserialization of Untrusted Data |
Description | In Modem, there is a possible system crash due to a logic error. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863 |
Affected Software Versions | Modem LR12A, LR13, NR15, NR16, NR17 |
Report Source | External |
CVE | CVE-2024-20151 |
---|---|
Title | Out-of-bounds write in Modem |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. |
Affected Chipsets | MT2737, MT2739, MT6789, MT6813, MT6815, MT6835, MT6835T, MT6855, MT6878, MT6878T, MT6879, MT6886, MT6895, MT6895T, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6985, MT6986, MT6986D, MT6988, MT6989, MT6990, MT6991, MT8676, MT8678, MT8798, MT8863 |
Affected Software Versions | Modem NR16, NR17 |
Report Source | External |
CVE | CVE-2024-20152 |
---|---|
Title | Reachable assertion in wlan |
Severity | Medium |
Vulnerability Type | DoS |
CWE | CWE-617 Reachable Assertion |
Description | In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. |
Affected Chipsets | MT2737, MT3603, MT6835, MT6878, MT6886, MT6897, MT6990, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8755, MT8766, MT8768, MT8775, MT8781, MT8796, MT8798, MT8893 |
Affected Software Versions | Android 13.0, 14.0, 15.0 / SDK release 2.4 and before / openWRT 23.05 / Yocto 3.3, 4.0, 5.0 |
Report Source | Internal |
CVE | CVE-2024-20153 |
---|---|
Title | Missing critical step in authentication in wlan |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-304 Missing Critical Step in Authentication |
Description | In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT2737, MT6989, MT6991, MT7925, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8676, MT8678, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893 |
Affected Software Versions | Android 14.0, 15.0 / SDK release 3.5 and before / Yocto 3.3, 4.0, 5.0 |
Report Source | Internal |
Vulnerability Type Definition
Abbreviation | Definition |
---|---|
RCE | Remote Code Execution |
EoP | Elevation of Privilege |
ID | Information Disclosure |
DoS | Denial of Service |
N/A | Classification not available |
Versions
Version | Date | Description |
1.0 | January 6, 2025 | Bulletin published. |
Notes
Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.