In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6989 Mediatek mt6991 Mediatek mt7925 Mediatek mt8365 Mediatek mt8518s Mediatek mt8532 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8676 Mediatek mt8678 Mediatek mt8755 Mediatek mt8766 Mediatek mt8768 Mediatek mt8775 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8796 Mediatek mt8798 Mediatek mt8893 Mediatek software Development Kit |
|
| CPEs | cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:5.0:*:*:*:*:*:*:* cpe:2.3:a:mediatek:software_development_kit:*:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt7925:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8518s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8755:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6989 Mediatek mt6991 Mediatek mt7925 Mediatek mt8365 Mediatek mt8518s Mediatek mt8532 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8676 Mediatek mt8678 Mediatek mt8755 Mediatek mt8766 Mediatek mt8768 Mediatek mt8775 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8796 Mediatek mt8798 Mediatek mt8893 Mediatek software Development Kit |
Mon, 06 Jan 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 06 Jan 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598. | |
| Weaknesses | CWE-304 | |
| References |
|
Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2025-01-06T14:11:35.078Z
Reserved: 2023-11-02T13:35:35.189Z
Link: CVE-2024-20153
Updated: 2025-01-06T14:11:26.914Z
Status : Analyzed
Published: 2025-01-06T04:15:07.647
Modified: 2026-01-12T16:20:48.680
Link: CVE-2024-20153
No data.
OpenCVE Enrichment
No data.