In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598.
References
| Link | Resource |
|---|---|
| https://corp.mediatek.com/product-security-bulletin/January-2025 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
12 Jan 2026, 16:20
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Mediatek mt8781
Mediatek software Development Kit Mediatek mt8893 Mediatek mt8518s Mediatek mt8766 Linuxfoundation Mediatek mt8768 Mediatek mt8365 Mediatek mt8775 Mediatek mt7925 Mediatek mt8755 Mediatek mt2737 Mediatek mt6989 Mediatek mt6991 Mediatek mt8667 Google android Mediatek mt8666 Mediatek mt8798 Mediatek mt8796 Mediatek mt8673 Mediatek mt8676 Mediatek mt8532 Mediatek mt8678 Mediatek mt8788 Linuxfoundation yocto Mediatek mt8786 Mediatek |
|
| References | () https://corp.mediatek.com/product-security-bulletin/January-2025 - Vendor Advisory | |
| CPE | cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* |
06 Jan 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
06 Jan 2025, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-06 04:15
Updated : 2026-01-12 16:20
NVD link : CVE-2024-20153
Mitre link : CVE-2024-20153
CVE.ORG link : CVE-2024-20153
JSON object : View
Products Affected
mediatek
- mt8678
- mt8667
- mt2737
- mt8666
- mt8786
- mt8766
- mt8676
- mt8893
- mt8365
- mt8518s
- mt8673
- software_development_kit
- mt8796
- mt8768
- mt8775
- mt7925
- mt8798
- mt8788
- mt6991
- mt8532
- mt8755
- mt8781
- mt6989
linuxfoundation
- yocto
- android
CWE
CWE-304
Missing Critical Step in Authentication
