CVE-2024-20106

Access of Resource Using Incompatible Type ('Type Confusion') (CWE-843)

Published: Nov 4, 2024 / Updated: 16d ago

010
CVSS 6.7EPSS 0.04%Medium
CVE info copied to clipboard

Summary

In m4u, there is a possible out of bounds write due to a missing bounds check. This vulnerability affects MediaTek products, including various MT series chips (mt6765, mt6785, mt6873, mt6885, mt8673, mt8666, mt6761, mt6853, mt8667, mt6779, mt6768, mt6739). The issue is related to CWE-843: Access of Resource Using Incompatible Type ('Type Confusion').

Impact

This vulnerability could lead to local escalation of privilege with System execution privileges needed. The potential impact is severe, with high risks to confidentiality, integrity, and availability. An attacker successfully exploiting this vulnerability could gain elevated system-level privileges, potentially compromising the entire device or system. The attack complexity is low, and no user interaction is required for exploitation, making it a significant threat.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability has been addressed in the Google Android Security Bulletin dated 2024-11-01. The specific patch ID is ALPS08960505, and the associated Issue ID is MSV-1590.

Mitigation

1. Apply the security patch provided in the Google Android Security Bulletin dated 2024-11-01 as soon as possible. 2. Prioritize patching efforts for this vulnerability due to its high impact and low attack complexity. 3. Monitor and restrict local access to affected systems until the patch can be applied. 4. Implement the principle of least privilege to minimize the potential impact of successful exploitation. 5. Keep all MediaTek-based devices and systems up to date with the latest security patches. 6. Regularly audit and monitor system logs for any suspicious activities that might indicate exploitation attempts.

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Timeline

Vendor Advisory

Google released a security advisory.

Nov 4, 2024 at 12:00 AM
CVE Assignment

NVD published the first details for CVE-2024-20106

Nov 4, 2024 at 2:15 AM
First Article

Feedly found the first article mentioning CVE-2024-20106. See article

Nov 4, 2024 at 2:21 AM / National Vulnerability Database
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.9%)

Nov 4, 2024 at 10:12 AM
CVSS

A CVSS base score of 6.7 has been assigned.

Nov 4, 2024 at 11:40 AM / nvd
Static CVE Timeline Graph

Affected Systems

Mediatek/mt6765
+null more

Patches

Google Android android-2024-11-01
+null more

Vendor Advisory

Android Security Bulletin November 2024
These vulnerabilities affect MediaTek components and further details are available directly from MediaTek. The severity assessment of these issues is provided directly by MediaTek. The severity assessment of these issues is provided directly by Imagination Technologies.

News

Multiple vulnerabilities in Google Android
The vulnerability exists due to improper input validation within the Framework component. The vulnerability allows a local application to execute arbitrary code.
Android Security Bulletin November 2024
Issues are described in the tables below and include CVE ID, associated references, type of vulnerability, severity, and updated AOSP versions (where applicable). Issues are described in the tables below and include CVE ID, associated references, type of vulnerability, severity, and updated AOSP versions (where applicable).
Android Security Bulletin November 2024
These vulnerabilities affect MediaTek components and further details are available directly from MediaTek. The severity assessment of these issues is provided directly by MediaTek. The severity assessment of these issues is provided directly by Imagination Technologies.
CVE-2024-20106
Medium Severity Description In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08960505; Issue ID: MSV-1590. Read more at https://www.tenable.com/cve/CVE-2024-20106
MediaTek Security Bulletin Highlights High Severity Vulnerabilities in Mobile Chipsets
MediaTek's security bulletin disclosed multiple vulnerabilities in its chipset product line, posing risks like escalated privileges and arbitrary code execution on devices such as smartphones, tablets, AIoT devices, and smart displays, with high-severity vulnerabilities including CVE-2024-20104 and CVE-2024-20106. MediaTek issued a security bulletin revealing multiple vulnerabilities across its chipset product line affecting devices like smartphones, tablets, AIoT devices, and smart displays.
See 13 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:High
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI