{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T15:42:02.269","vulnerabilities":[{"cve":{"id":"CVE-2024-20102","sourceIdentifier":"security@mediatek.com","published":"2024-10-07T03:15:03.427","lastModified":"2025-03-13T19:15:42.127","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601."},{"lang":"es","value":"En el controlador WLAN, existe una posible lectura fuera de los límites debido a una validación de entrada incorrecta. Esto podría provocar la divulgación de información remota con privilegios de ejecución de System necesarios. No se necesita interacción del usuario para la explotación. ID de parche: ALPS08998892; ID de problema: MSV-1601."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"security@mediatek.com","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*","matchCriteriaId":"879FFD0C-9B38-4CAA-B057-1086D794D469"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*","matchCriteriaId":"2700BCC5-634D-4EC6-AB67-5B678D5F951D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt3605:-:*:*:*:*:*:*:*","matchCriteriaId":"2F897E19-008E-4DC8-B4CB-BF27044B9F5C"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*","matchCriteriaId":"EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*","matchCriteriaId":"AD7DE6B2-66D9-4A3E-B15F-D56505559255"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*","matchCriteriaId":"1A76806D-A4E3-466A-90CB-E9FFE478E7A0"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt7927:-:*:*:*:*:*:*:*","matchCriteriaId":"05525018-AFE0-415C-A71C-A77922C7D637"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*","matchCriteriaId":"152A5F3D-8004-4649-BDB1-E6F0798AF1CB"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*","matchCriteriaId":"DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*","matchCriteriaId":"CCFAADB1-C2B2-47A6-BB66-761B964E7DFB"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/October-2024","source":"security@mediatek.com","tags":["Vendor Advisory"]}]}}]}