MEDIUM · 4.4

CVE-2024-20152

In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privileg...

Vulnerability Description

In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.

CVSS Score

4.4

MEDIUM

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
LinuxfoundationYocto3.3
MediatekSoftware Development Kit<= 2.4
GoogleAndroid13.0
OpenwrtOpenwrt23.05
MediatekMt2737-
MediatekMt3603-
MediatekMt6835-
MediatekMt6878-
MediatekMt6886-
MediatekMt6897-
MediatekMt6990-
MediatekMt7902-
MediatekMt7920-
MediatekMt7922-
MediatekMt8518S-
MediatekMt8532-
MediatekMt8755-
MediatekMt8766-
MediatekMt8768-
MediatekMt8775-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-20152?

CVE-2024-20152 is a vulnerability with a CVSS score of 4.4 (MEDIUM). In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privileg...

How severe is CVE-2024-20152?

CVE-2024-20152 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-20152?

Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Yocto, Mediatek Software Development Kit, Google Android, Openwrt Openwrt, Mediatek Mt2737.