Friend
Professional
- Messages
- 2,658
- Reaction score
- 864
- Points
- 113
An exploit for the Zero-Click vulnerability in MediaTek chips is already in full swing on the network.
Researchers at SonicWall have carefully analyzed a critical security vulnerability in devices with MediaTek chips that allows attackers to remotely take control of smartphones and routers without any user interaction.
This Zero-Click flaw, designated CVE-2024-20017, can be used to execute remote code (RCE) and poses a serious threat to device owners from manufacturers such as Ubiquiti, Xiaomi, and Netgear.
The vulnerability is estimated at 9.8 points according to the CVSS system, which brings it closer to the maximum critical level. Exploitation of this bug is possible due to an error in the drivers of Wi-Fi chipsets of MediaTek chipsets, and the attack does not require any action on the part of the user.
SonicWall experts warn that although the relevant patches were released by MediaTek back in March, a public PoC exploit for this vulnerability was recently published, which increases the risk of mass attacks. The issue affects versions of the MediaTek SDK up to and including 7.4.0.1, as well as OpenWRT versions 19.07 and 21.02.
Technically, the vulnerability is related to a buffer overflow during the operation of the wappd service, which is responsible for managing wireless interfaces and access points on devices. The problem lies in the incorrect processing of data transmitted through a network packet, which leads to data being written outside the allocated memory and allows attackers to execute arbitrary code.
SonicWall emphasizes that the wappd architecture is very complex and includes both the network service itself and local services that interact with the device's wireless interfaces, which makes this vulnerability particularly dangerous.
To keep their devices safe, users are advised to update their software as quickly as possible by taking advantage of patches released by MediaTek and all affected vendors whose hardware was at risk of exploiting CVE-2024-20017.
Source
Researchers at SonicWall have carefully analyzed a critical security vulnerability in devices with MediaTek chips that allows attackers to remotely take control of smartphones and routers without any user interaction.
This Zero-Click flaw, designated CVE-2024-20017, can be used to execute remote code (RCE) and poses a serious threat to device owners from manufacturers such as Ubiquiti, Xiaomi, and Netgear.
The vulnerability is estimated at 9.8 points according to the CVSS system, which brings it closer to the maximum critical level. Exploitation of this bug is possible due to an error in the drivers of Wi-Fi chipsets of MediaTek chipsets, and the attack does not require any action on the part of the user.
SonicWall experts warn that although the relevant patches were released by MediaTek back in March, a public PoC exploit for this vulnerability was recently published, which increases the risk of mass attacks. The issue affects versions of the MediaTek SDK up to and including 7.4.0.1, as well as OpenWRT versions 19.07 and 21.02.
Technically, the vulnerability is related to a buffer overflow during the operation of the wappd service, which is responsible for managing wireless interfaces and access points on devices. The problem lies in the incorrect processing of data transmitted through a network packet, which leads to data being written outside the allocated memory and allows attackers to execute arbitrary code.
SonicWall emphasizes that the wappd architecture is very complex and includes both the network service itself and local services that interact with the device's wireless interfaces, which makes this vulnerability particularly dangerous.
To keep their devices safe, users are advised to update their software as quickly as possible by taking advantage of patches released by MediaTek and all affected vendors whose hardware was at risk of exploiting CVE-2024-20017.
Source