MediaTek Bluetooth Chipset Vulnerabilities

A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.

MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as the world’s second-largest provider of smartphone chipsets with 1.5 billion active Android devices.

Known for integrating advanced 5G, AI, imaging, connectivity, and gaming technologies, MediaTek delivers high-performance solutions that enhance user experiences across a wide range of devices globally.

Google News

The vulnerabilities, detailed in a recent security bulletin, present significant risks, including escalation of privileges and denial of service attacks.

One of the most critical vulnerabilities, identified as CVE-2024-20125, pertains to an out-of-bounds write in the vdec component. This flaw could potentially lead to a local escalation of privilege, allowing attackers to gain system execution privileges without the need for user interaction.

“In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.” Mediatek stated in security bulletin

Affected chipsets include MT6580, MT6761, MT6765, MT6768, and many others. This vulnerability impacts devices running on Android 13.0 and 14.0.

Several medium severity vulnerabilities have been identified:

CVE IDDescriptionImpactAffected ChipsetsAffected Android Versions
CVE-2024-20129Out-of-bounds read in the Telephony component.Remote Denial of ServiceMT6580, MT6739, MT6761 and more13.0, 14.0, 15.0
CVE-2024-20128Out-of-bounds read in the Telephony component.Remote Denial of ServiceMT6580, MT6739, MT6761 and more13.0, 14.0, 15.0
CVE-2024-20127Out-of-bounds read in the Telephony component.Remote Denial of ServiceMT6580, MT6739, MT6761 and more13.0, 14.0, 15.0
CVE-2024-20130Stack overflow in the power component.Local Escalation of PrivilegeMT6739, MT676114.0, 15.0
CVE-2024-20131Out-of-bounds write in the Modem component.Local Privilege EscalationModem NR16 versions
CVE-2024-20132Out-of-bounds write in the Modem component.Local Privilege EscalationModem NR16 versions
CVE-2024-20133Out-of-bounds write in the ril component.Local Privilege EscalationModem NR16 versions
CVE-2024-20134Out-of-bounds write in the ril component.Local Privilege EscalationModem NR16 versions
CVE-2024-20135Out-of-bounds write in the soundtrigger component.Privilege EscalationMultiple chipsets14.0, 15.0

Additional vulnerabilities extend beyond Android, affecting platforms such as openWRT, Yocto, and RDK-B:

  • CVE-2024-20136: An out-of-bounds read in DA could lead to local information disclosure, affecting a wide range of chipsets and software versions, including openWRT 19.07 and Yocto 4.0.
  • CVE-2024-20137, CVE-2024-20138, and CVE-2024-20139: Issues in wlan and Bluetooth components could lead to client disconnection and information disclosure, affecting SDK releases and other platforms.

Response and Recommendations

MediaTek has acknowledged these vulnerabilities and urges organizations to update affected systems immediately. The company has provided a report mechanism on its website for users to disclose any additional findings.

We advise device OEMs to contact their respective MediaTek representatives for further assistance.

This bulletin serves as a crucial reminder for continuous monitoring and updating of system software to protect against potential security breaches.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Balaji N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.