Project Subscriptions
| Vendors | Products |
|---|---|
|
Google
Subscribe
|
Android
Subscribe
|
|
Linuxfoundation
Subscribe
|
Yocto
Subscribe
|
|
Mediatek
Subscribe
|
Mt2737
Subscribe
Mt6989
Subscribe
Mt6991
Subscribe
Mt7925
Subscribe
Mt8365
Subscribe
Mt8518s
Subscribe
Mt8532
Subscribe
Mt8666
Subscribe
Mt8667
Subscribe
Mt8673
Subscribe
Mt8676
Subscribe
Mt8678
Subscribe
Mt8755
Subscribe
Mt8766
Subscribe
Mt8768
Subscribe
Mt8775
Subscribe
Mt8781
Subscribe
Mt8786
Subscribe
Mt8788
Subscribe
Mt8796
Subscribe
Mt8798
Subscribe
Mt8893
Subscribe
Software Development Kit
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 12 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6989 Mediatek mt6991 Mediatek mt7925 Mediatek mt8365 Mediatek mt8518s Mediatek mt8532 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8676 Mediatek mt8678 Mediatek mt8755 Mediatek mt8766 Mediatek mt8768 Mediatek mt8775 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8796 Mediatek mt8798 Mediatek mt8893 Mediatek software Development Kit |
|
| CPEs | cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6989 Mediatek mt6991 Mediatek mt7925 Mediatek mt8365 Mediatek mt8518s Mediatek mt8532 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8676 Mediatek mt8678 Mediatek mt8755 Mediatek mt8766 Mediatek mt8768 Mediatek mt8775 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8796 Mediatek mt8798 Mediatek mt8893 Mediatek software Development Kit |
Mon, 06 Jan 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 06 Jan 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598. | |
| Weaknesses | CWE-304 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2025-01-06T14:11:35.078Z
Reserved: 2023-11-02T13:35:35.189Z
Link: CVE-2024-20153
Updated: 2025-01-06T14:11:26.914Z
Status : Analyzed
Published: 2025-01-06T04:15:07.647
Modified: 2026-01-12T16:20:48.680
Link: CVE-2024-20153
No data.
OpenCVE Enrichment
No data.