CVE-2024-20153
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
06/01/2025
Last modified:
12/01/2026
Description
In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* | 3.5 (including) | |
| cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



