In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 12 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Mediatek
Mediatek lr12a
Mediatek lr13
Mediatek mt2735
Mediatek mt6767
Mediatek mt6768
Mediatek mt6769
Mediatek mt6769k
Mediatek mt6769s
Mediatek mt6769t
Mediatek mt6769z
Mediatek mt6779
Mediatek mt6781
Mediatek mt6783
Mediatek mt6785
Mediatek mt6785t
Mediatek mt6785u
Mediatek mt6789
Mediatek mt6833p
Mediatek mt6853
Mediatek mt6853t
Mediatek mt6855
Mediatek mt6855t
Mediatek mt6873
Mediatek mt6875
Mediatek mt6875t
Mediatek mt6877
Mediatek mt6877t
Mediatek mt6877tt
Mediatek mt6880
Mediatek mt6880t
Mediatek mt6880u
Mediatek mt6883
Mediatek mt6885
Mediatek mt6889
Mediatek mt6890
Mediatek mt6891
Mediatek mt6893
Mediatek mt8666
Mediatek mt8673
Mediatek mt8675
Mediatek mt8765
Mediatek mt8766
Mediatek mt8768
Mediatek mt8771
Mediatek mt8781
Mediatek mt8786
Mediatek mt8788
Mediatek mt8788e
Mediatek mt8789
Mediatek mt8791t
Mediatek mt8795t
Mediatek mt8797
Mediatek mt8798
Mediatek nr16.r1.mp
Mediatek nr16.r1.mp1mp2.mp
Mediatek nr16.r2.mp
Weaknesses CWE-787
CPEs cpe:2.3:h:mediatek:mt2735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6767:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769k:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769z:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6783:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833p:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877tt:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6880u:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr12a:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:lr13:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp1mp2.mp:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r1.mp:-:*:*:*:*:*:*:*
cpe:2.3:o:mediatek:nr16.r2.mp:-:*:*:*:*:*:*:*
Vendors & Products Mediatek
Mediatek lr12a
Mediatek lr13
Mediatek mt2735
Mediatek mt6767
Mediatek mt6768
Mediatek mt6769
Mediatek mt6769k
Mediatek mt6769s
Mediatek mt6769t
Mediatek mt6769z
Mediatek mt6779
Mediatek mt6781
Mediatek mt6783
Mediatek mt6785
Mediatek mt6785t
Mediatek mt6785u
Mediatek mt6789
Mediatek mt6833p
Mediatek mt6853
Mediatek mt6853t
Mediatek mt6855
Mediatek mt6855t
Mediatek mt6873
Mediatek mt6875
Mediatek mt6875t
Mediatek mt6877
Mediatek mt6877t
Mediatek mt6877tt
Mediatek mt6880
Mediatek mt6880t
Mediatek mt6880u
Mediatek mt6883
Mediatek mt6885
Mediatek mt6889
Mediatek mt6890
Mediatek mt6891
Mediatek mt6893
Mediatek mt8666
Mediatek mt8673
Mediatek mt8675
Mediatek mt8765
Mediatek mt8766
Mediatek mt8768
Mediatek mt8771
Mediatek mt8781
Mediatek mt8786
Mediatek mt8788
Mediatek mt8788e
Mediatek mt8789
Mediatek mt8791t
Mediatek mt8795t
Mediatek mt8797
Mediatek mt8798
Mediatek nr16.r1.mp
Mediatek nr16.r1.mp1mp2.mp
Mediatek nr16.r2.mp

Mon, 06 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Jan 2025 03:30:00 +0000

Type Values Removed Values Added
Description In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00720348; Issue ID: MSV-2392.
Weaknesses CWE-121
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: MediaTek

Published:

Updated: 2025-01-08T04:55:47.976Z

Reserved: 2023-11-02T13:35:35.189Z

Link: CVE-2024-20154

cve-icon Vulnrichment

Updated: 2025-01-06T14:21:51.451Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-06T04:15:07.770

Modified: 2026-01-12T16:19:37.497

Link: CVE-2024-20154

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses