CVE-2024-20001

In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory

09 Feb 2024, 02:02

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
References () https://corp.mediatek.com/product-security-bulletin/February-2024 - () https://corp.mediatek.com/product-security-bulletin/February-2024 - Vendor Advisory
First Time Mediatek mt9685
Mediatek mt9679
Mediatek mt9675
Mediatek mt9610
Mediatek mt9269
Mediatek mt9021
Mediatek mt9636
Mediatek mt9667
Mediatek mt9222
Mediatek mt5586
Mediatek mt9652
Mediatek mt9256
Mediatek mt9613
Mediatek mt9602
Google
Mediatek mt5696
Mediatek mt9629
Mediatek mt5691
Mediatek mt9255
Mediatek mt9689
Mediatek mt9022
Mediatek mt9650
Mediatek mt5583
Google android
Mediatek mt9618
Mediatek mt9653
Mediatek mt9688
Mediatek mt9632
Mediatek mt9631
Mediatek mt9671
Mediatek mt9612
Mediatek mt9666
Mediatek mt9617
Mediatek mt9639
Mediatek mt9025
Mediatek mt9288
Mediatek mt9286
Mediatek mt9020
Mediatek mt9633
Mediatek mt9010
Mediatek
Mediatek mt9649
Mediatek mt9266
Mediatek mt9686
Mediatek mt9026
Mediatek mt9603
Mediatek mt9615
Mediatek mt9220
Mediatek mt9218
Mediatek mt9221
Mediatek mt9216
Mediatek mt9011
Mediatek mt9012
Mediatek mt9015
Mediatek mt5695
Mediatek mt9611
Mediatek mt9630
Mediatek mt9660
Mediatek mt9669
Mediatek mt9016
Mediatek mt9638
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7

05 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 06:15

Updated : 2024-11-21 08:51


NVD link : CVE-2024-20001

Mitre link : CVE-2024-20001

CVE.ORG link : CVE-2024-20001


JSON object : View

Products Affected

mediatek

  • mt9653
  • mt9216
  • mt9649
  • mt9016
  • mt9685
  • mt5583
  • mt9255
  • mt9631
  • mt9022
  • mt9021
  • mt9671
  • mt9638
  • mt9615
  • mt9660
  • mt9011
  • mt9025
  • mt9269
  • mt9618
  • mt9602
  • mt9629
  • mt9630
  • mt9652
  • mt9611
  • mt9612
  • mt9667
  • mt9679
  • mt5691
  • mt9266
  • mt9613
  • mt9603
  • mt9636
  • mt9020
  • mt9617
  • mt9675
  • mt9689
  • mt9015
  • mt9632
  • mt9026
  • mt9218
  • mt9639
  • mt9650
  • mt9686
  • mt9688
  • mt9256
  • mt9288
  • mt9222
  • mt9286
  • mt5695
  • mt9221
  • mt9633
  • mt5586
  • mt9010
  • mt9220
  • mt9610
  • mt9669
  • mt5696
  • mt9012
  • mt9666

google

  • android
CWE
CWE-787

Out-of-bounds Write