CVE-2024-20153Missing Critical Step in Authentication in Software Development KIT

Severity
7.5HIGHNVD
EPSS
0.7%
top 28.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6

Description

In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08990446 / ALPS09057442; Issue ID: MSV-1598.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDgoogle/android14.0, 15.0+1
NVDlinuxfoundation/yocto3.3, 4.0, 5.0+2

🔴Vulnerability Details

2
CVEList
CVE-2024-20153: In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID2025-01-06
GHSA
GHSA-2h9f-xm25-q379: In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID2025-01-06
CVE-2024-20153 — Software Development KIT vulnerability | cvebase