Vulnerability Description
In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Yocto | 3.3 |
| Mediatek | Software Development Kit | <= 2.4 |
| Android | 13.0 | |
| Openwrt | Openwrt | 23.05 |
| Mediatek | Mt2737 | - |
| Mediatek | Mt3603 | - |
| Mediatek | Mt6835 | - |
| Mediatek | Mt6878 | - |
| Mediatek | Mt6886 | - |
| Mediatek | Mt6897 | - |
| Mediatek | Mt6990 | - |
| Mediatek | Mt7902 | - |
| Mediatek | Mt7920 | - |
| Mediatek | Mt7922 | - |
| Mediatek | Mt8518S | - |
| Mediatek | Mt8532 | - |
| Mediatek | Mt8755 | - |
| Mediatek | Mt8766 | - |
| Mediatek | Mt8768 | - |
| Mediatek | Mt8775 | - |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-20152?
CVE-2024-20152 is a vulnerability with a CVSS score of 4.4 (MEDIUM). In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privileg...
How severe is CVE-2024-20152?
CVE-2024-20152 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-20152?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Yocto, Mediatek Software Development Kit, Google Android, Openwrt Openwrt, Mediatek Mt2737.