Description
In mtk_p2p_wext_set_key of drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_p2p.c, there is a possible OOB write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Published: 2024-12-04
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Dec 2024 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Thu, 05 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Google pixel
Weaknesses CWE-787
CPEs cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
Vendors & Products Google
Google android
Google pixel
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 04 Dec 2024 17:30:00 +0000

Type Values Removed Values Added
Description In mtk_p2p_wext_set_key of drivers/misc/mediatek/connectivity/wlan/gen2/os/linux/gl_p2p.c, there is a possible OOB write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-12-05T17:15:12.151Z

Reserved: 2018-04-05T00:00:00.000Z

Link: CVE-2018-9394

cve-icon Vulnrichment

Updated: 2024-12-05T17:15:05.768Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-04T18:15:10.003

Modified: 2024-12-18T20:24:41.127

Link: CVE-2018-9394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses