CVE-2024-20017
Published Mar 4, 2024
Last updated 2 months ago
Overview
- Description
- In wlan service, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation Patch ID: WCNCR00350938; Issue ID: MSV-1132.
- Source
- security@mediatek.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-20
Social media
- Hype score
1
Actively exploited CVE : CVE-2024-20017
@transilienceai
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-20017
@transilienceai
Nov 14, 2024 5:37 PM
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-20017
@transilienceai
Nov 4, 2024 12:00 AM
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways | hyprblog http://0.0.0.0:4000/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
@akaclandestine
Nov 2, 2024 9:58 PM
1183 Impressions
3 Retweets
7 Likes
2 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-20017
@transilienceai
Oct 29, 2024 11:34 PM
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways #exploits #bug #cve202420017 #exploitmitigations #exploitdevelopment https://t.co/Q4cN8IJqLl
@reverseame
Oct 25, 2024 5:31 PM
1428 Impressions
8 Retweets
34 Likes
16 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-20017
@transilienceai
Oct 23, 2024 1:16 AM
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-20017
@transilienceai
Oct 20, 2024 1:13 AM
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
4 Exploits, 1 Bug: Exploiting CVE-2024-20017 in 4 Ways with @hyprdude! 1. RIP hijack 2. Arbitrary write via pointer corruption 3. Arbitrary write via ROP (full RELRO) 4. WAX206 return address corruption + arbitrary r/w via pointer corruption Here's the TL;DR https://t.co/XcGIJa
@ctbbpodcast
Oct 19, 2024 6:14 PM
1833 Impressions
4 Retweets
52 Likes
23 Bookmarks
2 Replies
0 Quotes