CyberSecurity SEE

MediaTek vulnerabilities enable attackers to escalate privileges

MediaTek vulnerabilities enable attackers to escalate privileges

MediaTek, a prominent chipmaker, recently released a Product Security Bulletin detailing two high-severity vulnerabilities that impact a wide range of devices, including smartphones, tablets, AIoT devices, smart displays, and more. These vulnerabilities, if exploited, could allow attackers to escalate their privileges on affected devices, potentially leading to unauthorized access and control.

The vulnerabilities, named CVE-2024-20104 and CVE-2024-20106, have been classified as “High” severity according to the Common Vulnerability Scoring System version 3.1 (CVSS v3.1). This classification signifies a significant risk if these vulnerabilities are left unpatched, underscoring the importance of prompt updates and security measures.

The first vulnerability, CVE-2024-20104, is attributed to an out-of-bounds write issue in the DA (Download Agent) component. This vulnerability stems from inadequate bounds checking, which could allow an attacker to overwrite memory beyond the intended range. If successfully exploited, this flaw could result in a local privilege escalation, granting attackers heightened access rights on the compromised device. Notably, exploiting this vulnerability necessitates user interaction, although no additional execution privileges are required.

Devices utilizing MediaTek chipsets, such as the MT6781, MT6879, and MT6983, are at risk if they run specific software versions, including Android, OpenWRT, Yocto, or RDK-B. The affected software versions encompass Android 12.0, 13.0, 14.0, 15.0, OpenWRT 19.07, 21.02, 23.05, Yocto 4.0, and RDK-B 22Q3, 24Q1.

The second vulnerability, CVE-2024-20106, is characterized by a type confusion flaw in the M4U (Memory Management Unit) component. This vulnerability, similar to CVE-2024-20104, could lead to an out-of-bounds write due to missing checks. However, this vulnerability is deemed more severe as it does not require user interaction and could potentially grant attackers system-level execution privileges. Chips affected by this vulnerability include MT6739, MT6765, and MT6885 models.

MediaTek has been collaborating closely with device manufacturers (OEMs) to ensure the timely delivery of security patches addressing these vulnerabilities. OEMs have had access to these updates for over two months, enabling them to incorporate the necessary fixes into their software updates. Users are strongly advised to install the latest firmware and security updates on their devices as a proactive measure to mitigate any risks associated with these vulnerabilities.

In conclusion, the disclosure of these high-severity vulnerabilities underscores the critical importance of timely patching and maintenance of software for both device manufacturers and end-users. By staying vigilant and proactive in implementing security updates, the risks posed by these vulnerabilities can be effectively mitigated, safeguarding the integrity and security of connected devices and networks.

Source link

Exit mobile version