CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-20142

High Severity
Google
SVRS
61/100

CVSSv3
6.6/10

EPSS
0.00013/1

CVE-2024-20142 is an out-of-bounds write vulnerability in V5 DA, potentially leading to local privilege escalation. This vulnerability arises from a missing bounds check, allowing an attacker with physical access to the device to execute arbitrary code with elevated privileges, albeit requiring user interaction. The SVRS score of 61 suggests a moderate risk, while the CVSS score is 6.6. Despite not being immediately critical (SVRS above 80), CVE-2024-20142 poses a significant risk due to potential privilege escalation for attackers with physical access, which is compounded by the fact that the vulnerability is tagged as In The Wild. Applying the provided patch ID ALPS09291406 is recommended to mitigate the security risk. The vulnerability is classified as CWE-787, highlighting the risk of writing data beyond the allocated memory boundaries, potentially causing crashes or enabling malicious code execution. It's crucial to implement the patch and monitor devices to ensure system integrity and prevent exploitation.

In The Wild
CVSS:3.1
AV:P
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2025-02-03

2025-02-03
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-20142 describes a potential out-of-bounds write vulnerability in V5 DA software. This flaw arises from a missing bounds check, which could enable a local attacker with physical access to the device to escalate privileges without needing additional execution permissions. User interaction is required for exploitation. The vulnerability has been assigned a CVSS score of 0, indicating a low base severity. However, SOCRadar's SVRS assigns a score of 34, signifying a moderate risk level and necessitating attention.

Key Insights

  • Local Privilege Escalation: The primary concern is the potential for a local attacker to gain elevated privileges on the device. This could allow them to access sensitive data, install malicious software, or disrupt system operations.
  • Physical Access Required: Exploitation requires physical access to the device. This suggests that the threat is primarily targeted at individuals or organizations with limited physical security measures.
  • User Interaction Necessary: The vulnerability necessitates user interaction for exploitation. This means that an attacker would need to trick a user into performing a specific action to trigger the vulnerability.
  • Moderate Risk Level: While the CVSS score is low, the SVRS rating of 34 indicates a moderate level of risk. This highlights the importance of taking appropriate measures to address the vulnerability.

Mitigation Strategies

  • Patching: The most effective mitigation strategy is to apply the available patch (ALPS09291406). This patch addresses the out-of-bounds write vulnerability and prevents exploitation.
  • Physical Security: Implement robust physical security measures to limit unauthorized access to devices. This could include access controls, surveillance systems, and secure storage areas.
  • User Awareness Training: Educate users about the potential risks of malicious software and how to avoid clicking on suspicious links or opening attachments from unknown sources.
  • Vulnerability Scanning: Regularly scan devices for known vulnerabilities and proactively address any identified issues.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-20142 | MediaTek MT8893 V5 DA out-of-bounds write (MSV-2070 / ALPS09291406)
vuldb.com2025-02-03
CVE-2024-20142 | MediaTek MT8893 V5 DA out-of-bounds write (MSV-2070 / ALPS09291406) | A vulnerability was found in MediaTek MT6739, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6833, MT6853, MT6873, MT6877, MT6885, MT6893, MT8167, MT8167S, MT8175, MT8185, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8678, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8795T, MT8797, MT8798 and MT8893. It has been classified as critical. Affected is an unknown function of the component <em
vuldb.com
rss
forum
news

Social Media

CVE-CVE-2024-20142: In V5 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to —CVSS 6.6 crushes Legal. Old bug, new chaos—don’t let this relic ruin your day! Free $500 scan—https://t.co/eoMhrefG0X #CyberSec2025 #DataBreach #Th
0
0
0
CVE-CVE-2024-20142: In V5 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to —CVSS 6.6 rips Healthcare. Old bug, new chaos—don’t let this relic ruin your day! Free $500 scan—https://t.co/eoMhrefG0X #ThreatHunting #CyberSec202
0
0
0
New post from https://t.co/uXvPWJy6tj (CVE-2024-20142 | MediaTek MT8893 V5 DA out-of-bounds write (MSV-2070 / ALPS09291406)) has been published on https://t.co/FLo3gkpORN
0
0
0
CVE-2024-20142 In V5 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access … https://t.co/FjHUIrOHcv
0
0
1

Affected Software

Configuration 1
TypeVendorProduct
OSGoogleandroid

References

ReferenceLink
[email protected]https://corp.mediatek.com/product-security-bulletin/February-2025

CWE Details

CWE IDCWE NameDescription
CWE-787Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence