Thursday, January 16, 2025
HomeCVE/vulnerabilityMediaTek Processor Vulnerabilities Let Attackers Escalate Privileges

MediaTek Processor Vulnerabilities Let Attackers Escalate Privileges

Published on

SIEM as a Service

Follow Us on Google News

Several vulnerabilities affecting MediaTek processors have been identified, potentially allowing attackers to escalate privileges on affected devices.

These vulnerabilities span multiple components, including video decoding, telephony, power management, and modem functionalities, posing significant risks to users worldwide.

Overview of Vulnerabilities

The vulnerabilities, identified by their Common Vulnerabilities and Exposures (CVEs), highlight issues primarily related to out-of-bounds reads and writes, stack overflow, and uncaught exceptions, as a report by Mediatek.

Such flaws can lead to various security threats, including local escalation of privilege and denial of service attacks, with minimal user interaction required for exploitation.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Table of CVEs and Details

The following table details all identified CVEs and their severity levels, vulnerability types, affected chipsets, and software versions.

CVE IDTitleSeverityCWE IDAffected Software Versions
CVE-2024-20125Out-of-bounds write in vdecHighCWE-787Android 13.0, 14.0
CVE-2024-20129Out-of-bounds read in TelephonyMediumCWE-125Android 13.0, 14.0, 15.0
CVE-2024-20128Out-of-bounds read in TelephonyMediumCWE-125Android 13.0, 14.0, 15.0
CVE-2024-20127Out-of-bounds read in TelephonyMediumCWE-125Android 13.0, 14.0, 15.0
CVE-2024-20130Stack overflow in powerMediumCWE-121Android 14.0, 15.0
CVE-2024-20131Out-of-bounds write in ModemMediumCWE-787Modem NR16
CVE-2024-20132Out-of-bounds write in ModemMediumCWE-787Modem NR16 partial branches
CVE-2024-20133Out-of-bounds write in ModemMediumCWE-787Modem NR16
CVE-2024-20134Out-of-bounds write in rilMediumCWE-787Android 14.0, 15.0
CVE-2024-20135Out-of-bounds write in soundtriggerMediumCWE-787Android 15.0
CVE-2024-20136Out-of-bounds read in DAMediumCWE-125Android 12.0, 13.0, 14.0, 15.0, openWRT 19.07, RDK-B
CVE-2024-20137Uncaught exception in wlanMediumCWE-248SDK release 7.4.0.1, 7.6.7.2 and before
CVE-2024-20116Out-of-bounds read in cmdqMediumCWE-125Android 12.0
CVE-2024-20138Out-of-bounds read in wlanMediumCWE-125SDK release 3.3 and before
CVE-2024-20139Reachable assertion in BluetoothMediumCWE-617Android 13.0, 14.0, openWRT 23.05

These vulnerabilities pose several significant risks:

  1. Privilege Escalation: The most critical vulnerability (CVE-2024-20125) allows system-level privilege escalation without user interaction. This could enable malicious actors to gain control over crucial functions of the device.
  2. Denial of Service: Multiple CVEs (e.g., CVE-2024-20129) can lead to denial of service, disrupting device operations and causing potential service interruptions.
  3. Information Disclosure: Out-of-bounds read vulnerabilities may expose sensitive information, leading to privacy concerns.
  4. Broad Impact: The affected chipsets include popular models such as MT6761 and MT6835, found in many devices worldwide, amplifying the potential impact.

To safeguard against these vulnerabilities, it is crucial to take the following steps:

  • Prompt Updates: Device manufacturers and users should ensure that all devices are updated with the latest security patches as soon as they are available.
  • Awareness and Monitoring: Organizations should monitor for any unusual activities on their networks that could indicate exploitation attempts.
  • Collaborative Efforts: Security researchers, MediaTek, and device manufacturers must collaborate to develop and distribute effective patches.

The discovery of these vulnerabilities underscores the ongoing challenges in maintaining security within complex hardware and software ecosystems like those involving MediaTek processors.

Comprehensive and timely responses are essential to mitigate the risks posed and protect users from potential exploitation.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...

FTC Slams GoDaddy For Not Implement Standard Security Practices Following Major Breaches

The Federal Trade Commission (FTC) has announced that it will require GoDaddy Inc. to...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting California Wildfire Sparks to Launching Phishing Attacks

As California grapples with devastating wildfires, communities are rallying to protect lives and property....

AIRASHI Botnet Exploiting 0-Day Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August...

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet's...