The MediaTek Product Security Bulletin contains details of security vulnerabilities affecting MediaTek Smartphone, Tablet, AIoT, Smart display, Smart platform, OTT, Wi-Fi, TV, Computer Vision and Audio chipsets. Device OEMs have been notified of all the issues and the corresponding security patches for at least two months before publication.
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
The severity of the identified vulnerabilities was conducted based on the Common Vulnerability Scoring System version 3.1 (CVSS v3.1).
Summary
Severity | CVEs |
---|---|
High | CVE-2024-20065, CVE-2024-20066, CVE-2024-20067, CVE-2024-20068, CVE-2024-20069 |
Medium | CVE-2024-20070, CVE-2024-20071, CVE-2024-20072, CVE-2024-20073, CVE-2024-20074, CVE-2024-20075 |
Details
CVE | CVE-2024-20065 |
---|---|
Title | Improper access control in telephony |
Severity | High |
Vulnerability Type | ID |
CWE | CWE-284 Improper Access Control |
Description | In telephony, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6768, MT6781, MT6835, MT6853, MT6855, MT6877, MT6879, MT6885, MT6886, MT6893, MT6983, MT6985, MT6989 |
Affected Software Versions | Android 12.0, 13.0, 14.0 |
CVE | CVE-2024-20066 |
---|---|
Title | Out-of-bounds write in Modem |
Severity | High |
Vulnerability Type | DoS |
CWE | CWE-787 Out-of-bounds Write |
Description | In modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. |
Affected Chipsets | MT6298, MT6813, MT6815, MT6835, MT6878, MT6879, MT6895, MT6895T, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6986, MT6986D, MT6990, MT6991, MT8673, MT8792, MT8798 |
Affected Software Versions | Modem NR16, NR17 |
CVE | CVE-2024-20067 |
---|---|
Title | Out-of-bounds write in Modem |
Severity | High |
Vulnerability Type | DoS |
CWE | CWE-787 Out-of-bounds Write |
Description | In modem, there is a possible out of bounds write due to improper input invalidation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6813, MT6815, MT6835, MT6878, MT6897, MT6899, MT6986, MT6986D, MT6991, MT8792 |
Affected Software Versions | Modem NR17, NR17R |
CVE | CVE-2024-20068 |
---|---|
Title | Out-of-bounds write in Modem |
Severity | High |
Vulnerability Type | DoS |
CWE | CWE-787 Out-of-bounds Write |
Description | In modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is no needed for exploitation. |
Affected Chipsets | MT6298, MT6813, MT6815, MT6835, MT6878, MT6879, MT6895, MT6895T, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6986, MT6986D, MT6990, MT6991, MT8673, MT8675, MT8771, MT8791T, MT8792, MT8797, MT8798 |
Affected Software Versions | Modem NR16, NR17 |
CVE | CVE-2024-20069 |
---|---|
Title | Selection of less-secure algorithm during negotiation ('algorithm downgrade') in Modem |
Severity | High |
Vulnerability Type | ID |
CWE | CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
Description | In modem, there is a possible selection of less-secure algorithm during the VoWiFi IKE due to a missing DH downgrade check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6833, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6883, MT6885, MT6889, MT6891, MT6893, MT8675, MT8771, MT8791T, MT8797 |
Affected Software Versions | Modem NR15 |
CVE | CVE-2024-20070 |
---|---|
Title | Use of a broken or risky cryptographic algorithm in Modem |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-327 Use of a Broken or Risky Cryptographic Algorithm |
Description | In modem, there is a possible information disclosure due to using risky cryptographic algorithm during connection establishment negotiation. This could lead to remote information disclosure, when weak encryption algorithm is used, with no additional execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6298, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6875T, MT6877, MT6878, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6895T, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6990, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8786, MT8791T, MT8792, MT8797, MT8798 |
Affected Software Versions | Modem NR15, NR16, NR17 |
CVE | CVE-2024-20071 |
---|---|
Title | Out-of-bounds read in wlan driver |
Severity | Medium |
Vulnerability Type | ID |
CWE | CWE-125 Out-of-bounds Read |
Description | In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6890, MT6990, MT7622 |
Affected Software Versions | SDK version 5.0.5.0 and before / OpenWRT 19.07, 21.02, 23.05 |
CVE | CVE-2024-20072 |
---|---|
Title | Out-of-bounds write in wlan driver |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6890, MT6990, MT7622 |
Affected Software Versions | SDK version 5.0.5.0 and before / OpenWRT 19.07, 21.02, 23.05 |
CVE | CVE-2024-20073 |
---|---|
Title | Out-of-bounds write in wlan service |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6890, MT7622 |
Affected Software Versions | SDK version 5.0.5.0 and before / OpenWRT 19.07, 21.02 |
CVE | CVE-2024-20074 |
---|---|
Title | Out-of-bounds write in dmc |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In dmc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT8666, MT8667, MT8673, MT8676 |
Affected Software Versions | Android 13.0, 14.0 |
CVE | CVE-2024-20075 |
---|---|
Title | Out-of-bounds write in eemgpu |
Severity | Medium |
Vulnerability Type | EoP |
CWE | CWE-787 Out-of-bounds Write |
Description | In eemgpu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. |
Affected Chipsets | MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8185, MT8675, MT8786, MT8789 |
Affected Software Versions | Android 12.0, 13.0, 14.0 |
Vulnerability Type Definition
Abbreviation | Definition |
---|---|
RCE | Remote Code Execution |
EoP | Elevation of Privilege |
ID | Information Disclosure |
DoS | Denial of Service |
N/A | Classification not available |
Versions
Version | Date | Description |
1.0 | June 3, 2024 | Bulletin published. |
Notes
Information above is generated only at the time of creation of this Security Bulletin. The list of affected chipsets could be not complete. For any further information, device OEMs can reach your MediaTek contact person if needed.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.
If you want to report a security vulnerability in MediaTek chipsets or products, please go to Report Security Vulnerability page on MediaTek website.