CVE-2024-20154

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
References
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp1mp2.mp:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r2.mp:-:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*

History

12 Jan 2026, 16:19

Type Values Removed Values Added
CPE cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880t:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp1mp2.mp:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r2.mp:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
CWE CWE-787
Summary
  • (es) En Modem, existe la posibilidad de una escritura fuera de los límites debido a la falta de una verificación de los límites. Esto podría provocar la ejecución remota de código, si un UE se ha conectado a una estación base no autorizada controlada por el atacante, sin necesidad de privilegios de ejecución adicionales. No se necesita la interacción del usuario para la explotación. ID de parche: MOLY00720348; ID de problema: MSV-2392.
References () https://corp.mediatek.com/product-security-bulletin/January-2025 - () https://corp.mediatek.com/product-security-bulletin/January-2025 - Vendor Advisory
First Time Mediatek mt6885
Mediatek mt8781
Mediatek nr16.r2.mp
Mediatek mt6779
Mediatek mt6785
Mediatek mt8766
Mediatek mt6875t
Mediatek mt6769t
Mediatek mt8768
Mediatek lr12a
Mediatek mt6785u
Mediatek mt6880t
Mediatek mt6883
Mediatek mt6853t
Mediatek mt6873
Mediatek mt6877tt
Mediatek mt6891
Mediatek mt8789
Mediatek mt6769k
Mediatek mt6785t
Mediatek mt6880
Mediatek mt8673
Mediatek mt6781
Mediatek mt8797
Mediatek mt6875
Mediatek mt8771
Mediatek mt6855t
Mediatek
Mediatek mt6893
Mediatek nr16.r1.mp1mp2.mp
Mediatek mt2735
Mediatek mt6769z
Mediatek mt8788e
Mediatek mt6877
Mediatek mt6768
Mediatek mt8765
Mediatek mt6853
Mediatek mt6855
Mediatek lr13
Mediatek mt8675
Mediatek mt6789
Mediatek mt6880u
Mediatek mt6877t
Mediatek mt6833p
Mediatek mt6767
Mediatek mt6889
Mediatek mt8791t
Mediatek mt8666
Mediatek mt8798
Mediatek mt6769
Mediatek mt6769s
Mediatek mt8795t
Mediatek mt8788
Mediatek nr16.r1.mp
Mediatek mt6890
Mediatek mt6783
Mediatek mt8786

06 Jan 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1

06 Jan 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-06 04:15

Updated : 2026-01-12 16:19


NVD link : CVE-2024-20154

Mitre link : CVE-2024-20154

CVE.ORG link : CVE-2024-20154


JSON object : View

Products Affected

mediatek

  • mt6783
  • mt8789
  • mt8797
  • mt6880
  • mt6779
  • mt6855t
  • nr16.r2.mp
  • mt6781
  • nr16.r1.mp1mp2.mp
  • mt6873
  • mt8666
  • mt8786
  • mt8766
  • nr16.r1.mp
  • mt6875
  • mt6875t
  • lr13
  • lr12a
  • mt8788e
  • mt6893
  • mt6880u
  • mt8673
  • mt8765
  • mt6833p
  • mt2735
  • mt6768
  • mt6877t
  • mt6785t
  • mt6785
  • mt8791t
  • mt6883
  • mt6877
  • mt6891
  • mt8675
  • mt6769t
  • mt6785u
  • mt6769z
  • mt8768
  • mt8798
  • mt6853
  • mt8788
  • mt6890
  • mt6853t
  • mt8795t
  • mt6877tt
  • mt6880t
  • mt6889
  • mt8771
  • mt6789
  • mt8781
  • mt6885
  • mt6769
  • mt6769k
  • mt6767
  • mt6769s
  • mt6855
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write