Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20148: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT3603, MT6835, MT6878, MT6886, MT6897, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8766, MT8768, MT8775, MT8796, MT8798

0
Critical
VulnerabilityCVE-2024-20148cvecve-2024-20148cwe-787
Published: Mon Jan 06 2025 (01/06/2025, 03:17:51 UTC)
Source: CVE Database V5
Vendor/Project: MediaTek, Inc.
Product: MT3603, MT6835, MT6878, MT6886, MT6897, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8766, MT8768, MT8775, MT8796, MT8798

Description

In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.

AI-Powered Analysis

AILast updated: 02/26/2026, 21:33:45 UTC

Technical Analysis

CVE-2024-20148 is a critical security vulnerability classified as CWE-787 (Out-of-bounds Write) found in the WLAN Station Firmware (STA FW) of multiple MediaTek chipsets, including MT3603, MT6835, MT6878, MT6886, MT6897, MT7902, MT7920, MT7922, MT8518S, MT8532, MT8766, MT8768, MT8775, MT8796, and MT8798. These chipsets are widely used in Android devices (versions 13.0 through 15.0), SDK release 2.4 and earlier, and Yocto Linux distributions 3.3, 4.0, and 5.0. The vulnerability stems from improper input validation in the WLAN STA firmware, which leads to an out-of-bounds write condition. This flaw can be exploited remotely by an attacker within wireless range (proximal or adjacent) without requiring any authentication or user interaction. Successful exploitation allows the attacker to execute arbitrary code on the affected device with the privileges of the WLAN firmware, potentially compromising the device’s confidentiality, integrity, and availability. The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild yet, the vulnerability poses a significant risk due to the widespread use of affected chipsets in consumer and embedded devices. The vendor has assigned patch IDs WCNCR00389045 and ALPS09136494 to address this issue, and the vulnerability is tracked under issue ID MSV-1796. The flaw’s exploitation could lead to remote code execution, enabling attackers to take control of devices, intercept or manipulate data, disrupt device operations, or pivot within networks.

Potential Impact

The impact of CVE-2024-20148 is severe and far-reaching for organizations worldwide using devices with affected MediaTek chipsets. Successful exploitation allows remote attackers within wireless range to execute arbitrary code without any authentication or user interaction, leading to full compromise of the device’s WLAN firmware. This can result in unauthorized access to sensitive data, manipulation or disruption of device functions, and potential lateral movement within corporate or critical infrastructure networks. The vulnerability affects a wide range of Android devices and embedded systems, including IoT devices, which are often deployed in enterprise, industrial, and consumer environments. The compromise of such devices can undermine network security, cause service outages, and expose organizations to data breaches or espionage. Given the critical CVSS score and the ease of exploitation, the threat is particularly significant in environments with dense wireless device usage, such as corporate campuses, public Wi-Fi hotspots, and industrial control systems. The lack of required user interaction increases the risk of automated or stealthy attacks. Organizations relying on MediaTek-based hardware must consider this vulnerability a high priority for remediation to prevent potential exploitation and associated operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2024-20148 effectively, organizations should implement the following specific measures: 1) Immediately apply official patches released by MediaTek or device manufacturers addressing this vulnerability (refer to patch IDs WCNCR00389045 and ALPS09136494). 2) For devices where patches are not yet available, restrict wireless access by disabling WLAN interfaces when not in use or limiting connections to trusted networks only. 3) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data repositories, reducing attack surface exposure. 4) Deploy wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor for anomalous or suspicious wireless activity indicative of exploitation attempts. 5) Enforce strong wireless security protocols (WPA3 where possible) and disable legacy or insecure protocols that could facilitate exploitation. 6) Regularly audit and inventory devices using affected MediaTek chipsets to ensure comprehensive coverage of remediation efforts. 7) Educate IT and security teams about the vulnerability’s characteristics to enhance detection and response capabilities. 8) Monitor vendor advisories and threat intelligence feeds for emerging exploit reports or updated mitigation guidance. These targeted actions go beyond generic advice by focusing on wireless-specific controls and proactive device management to reduce the risk of exploitation in diverse operational environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
MediaTek
Date Reserved
2023-11-02T13:35:35.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a43c85912abc71d620d5

Added to database: 2/26/2026, 7:51:24 PM

Last enriched: 2/26/2026, 9:33:45 PM

Last updated: 2/26/2026, 11:18:30 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses