NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-20001
Summary

In TVAPI, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03961601; Issue ID: DTV03961601.

Publication Date Feb. 5, 2024, 3:15 p.m.
Registration Date Feb. 6, 2024, 10:01 a.m.
Last Update Nov. 21, 2024, 5:51 p.m.
CVSS3.1 : MEDIUM
スコア 6.7
Vector CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:h:mediatek:mt5583:-:*:*:*:*:*:*:*
2 cpe:2.3:h:mediatek:mt5586:-:*:*:*:*:*:*:*
3 cpe:2.3:h:mediatek:mt5691:-:*:*:*:*:*:*:*
4 cpe:2.3:h:mediatek:mt5695:-:*:*:*:*:*:*:*
5 cpe:2.3:h:mediatek:mt5696:-:*:*:*:*:*:*:*
6 cpe:2.3:h:mediatek:mt9010:-:*:*:*:*:*:*:*
7 cpe:2.3:h:mediatek:mt9011:-:*:*:*:*:*:*:*
8 cpe:2.3:h:mediatek:mt9012:-:*:*:*:*:*:*:*
9 cpe:2.3:h:mediatek:mt9015:-:*:*:*:*:*:*:*
10 cpe:2.3:h:mediatek:mt9016:-:*:*:*:*:*:*:*
11 cpe:2.3:h:mediatek:mt9020:-:*:*:*:*:*:*:*
12 cpe:2.3:h:mediatek:mt9021:-:*:*:*:*:*:*:*
13 cpe:2.3:h:mediatek:mt9022:-:*:*:*:*:*:*:*
14 cpe:2.3:h:mediatek:mt9025:-:*:*:*:*:*:*:*
15 cpe:2.3:h:mediatek:mt9026:-:*:*:*:*:*:*:*
16 cpe:2.3:h:mediatek:mt9216:-:*:*:*:*:*:*:*
17 cpe:2.3:h:mediatek:mt9218:-:*:*:*:*:*:*:*
18 cpe:2.3:h:mediatek:mt9220:-:*:*:*:*:*:*:*
19 cpe:2.3:h:mediatek:mt9221:-:*:*:*:*:*:*:*
20 cpe:2.3:h:mediatek:mt9222:-:*:*:*:*:*:*:*
21 cpe:2.3:h:mediatek:mt9255:-:*:*:*:*:*:*:*
22 cpe:2.3:h:mediatek:mt9256:-:*:*:*:*:*:*:*
23 cpe:2.3:h:mediatek:mt9266:-:*:*:*:*:*:*:*
24 cpe:2.3:h:mediatek:mt9269:-:*:*:*:*:*:*:*
25 cpe:2.3:h:mediatek:mt9286:-:*:*:*:*:*:*:*
26 cpe:2.3:h:mediatek:mt9288:-:*:*:*:*:*:*:*
27 cpe:2.3:h:mediatek:mt9602:-:*:*:*:*:*:*:*
28 cpe:2.3:h:mediatek:mt9603:-:*:*:*:*:*:*:*
29 cpe:2.3:h:mediatek:mt9610:-:*:*:*:*:*:*:*
30 cpe:2.3:h:mediatek:mt9611:-:*:*:*:*:*:*:*
31 cpe:2.3:h:mediatek:mt9612:-:*:*:*:*:*:*:*
32 cpe:2.3:h:mediatek:mt9613:-:*:*:*:*:*:*:*
33 cpe:2.3:h:mediatek:mt9615:-:*:*:*:*:*:*:*
34 cpe:2.3:h:mediatek:mt9617:-:*:*:*:*:*:*:*
35 cpe:2.3:h:mediatek:mt9618:-:*:*:*:*:*:*:*
36 cpe:2.3:h:mediatek:mt9629:-:*:*:*:*:*:*:*
37 cpe:2.3:h:mediatek:mt9630:-:*:*:*:*:*:*:*
38 cpe:2.3:h:mediatek:mt9631:-:*:*:*:*:*:*:*
39 cpe:2.3:h:mediatek:mt9632:-:*:*:*:*:*:*:*
40 cpe:2.3:h:mediatek:mt9633:-:*:*:*:*:*:*:*
41 cpe:2.3:h:mediatek:mt9636:-:*:*:*:*:*:*:*
42 cpe:2.3:h:mediatek:mt9638:-:*:*:*:*:*:*:*
43 cpe:2.3:h:mediatek:mt9639:-:*:*:*:*:*:*:*
44 cpe:2.3:h:mediatek:mt9649:-:*:*:*:*:*:*:*
45 cpe:2.3:h:mediatek:mt9650:-:*:*:*:*:*:*:*
46 cpe:2.3:h:mediatek:mt9652:-:*:*:*:*:*:*:*
47 cpe:2.3:h:mediatek:mt9653:-:*:*:*:*:*:*:*
48 cpe:2.3:h:mediatek:mt9660:-:*:*:*:*:*:*:*
49 cpe:2.3:h:mediatek:mt9666:-:*:*:*:*:*:*:*
50 cpe:2.3:h:mediatek:mt9667:-:*:*:*:*:*:*:*
51 cpe:2.3:h:mediatek:mt9669:-:*:*:*:*:*:*:*
52 cpe:2.3:h:mediatek:mt9671:-:*:*:*:*:*:*:*
53 cpe:2.3:h:mediatek:mt9675:-:*:*:*:*:*:*:*
54 cpe:2.3:h:mediatek:mt9679:-:*:*:*:*:*:*:*
55 cpe:2.3:h:mediatek:mt9685:-:*:*:*:*:*:*:*
56 cpe:2.3:h:mediatek:mt9686:-:*:*:*:*:*:*:*
57 cpe:2.3:h:mediatek:mt9688:-:*:*:*:*:*:*:*
58 cpe:2.3:h:mediatek:mt9689:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List