CVE-2024-20148
Published: 06 January 2025
Summary
CVE-2024-20148 is a critical-severity Out-of-bounds Write (CWE-787) vulnerability in Linuxfoundation Yocto. Its CVSS base score is 9.8 (Critical).
Operationally, ranked at the 27.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates validation of information inputs to the system, addressing the improper input validation that enables the out-of-bounds write in WLAN STA firmware from crafted wireless packets.
Implements memory protection mechanisms such as bounds checking that directly mitigate out-of-bounds write vulnerabilities in firmware.
Requires timely flaw remediation including application of vendor patches like WCNCR00389045 to correct the specific vulnerability in WLAN STA firmware.
NVD Description
In wlan STA FW, there is a possible out of bounds write due to improper input validation. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID:…
more
WCNCR00389045 / ALPS09136494; Issue ID: MSV-1796.
Deeper analysisAI
CVE-2024-20148 is an out-of-bounds write vulnerability in the WLAN Station (STA) firmware due to improper input validation, tracked under CWE-787. It affects the WLAN STA firmware component, as detailed in MediaTek's product security bulletin. The issue carries a CVSS v3.1 base score of 9.8 (Critical), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high confidentiality, integrity, and availability impacts.
The vulnerability enables remote proximal or adjacent code execution without requiring additional privileges or user interaction. Attackers in network proximity can exploit it over the air via crafted wireless packets, potentially compromising the affected device at the firmware level.
MediaTek's January 2025 product security bulletin provides mitigation details, including Patch ID WCNCR00389045 and ALPS09136494, associated with Issue ID MSV-1796. Security practitioners should apply these patches to vulnerable WLAN STA firmware implementations.
Details
- CWE(s)