Technology

Critical Zero-Click Vulnerability Found in MediaTek Chipsets: Here’s What You Need to Know!

2024-09-23

Details of the Vulnerability

The cybersecurity firm SonicWall Capture Labs reported the vulnerability in March 2024, assigning it the identifier CVE-2024-20017. It has been rated a critical threat with a CVSS score of 9.8, indicating a high level of urgency for device owners to take action. The impact of this vulnerability is particularly alarming, as it can facilitate hacking attempts on devices powered by two specific MediaTek Wi-Fi chipsets: the MT7622 and MT7915, along with the RTxxxx series SoftAP driver bundles.

What Makes This Vulnerability So Dangerous?

Unlike traditional digital attacks that usually require the victim to click on a link or open a malicious attachment, this zero-click vulnerability allows attackers to exploit the system without any user interaction. Researchers noted that hackers could potentially gather sensitive information through a technique called "table overwrite," utilizing a return-oriented programming (ROP) exploit chain. This means that unknowing users may find their information compromised simply by having their devices online.

What Action Must Be Taken?

In response to this critical discovery, MediaTek has proactively issued patches to address the security flaw. Users are strongly advised to update their firmware immediately to safeguard their devices from potential exploitation. If you own a device that uses MediaTek chipsets, now is the time to check for updates and ensure your device is secure.

Stay Informed

As cybersecurity vulnerabilities like this can emerge rapidly, creating serious risks for users worldwide.