U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-20144

Change History

Initial Analysis by NIST 4/22/2025 9:50:01 AM

Action Type Old Value New Value
Added CWE

								
							
							
						
CWE-787
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
          *cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*
          *cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
          *cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
          *cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*
          *cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
          *cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
          *cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*
          *cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*
          cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
Added Reference Type

								
							
							
						
MediaTek, Inc.: https://corp.mediatek.com/product-security-bulletin/January-2025 Types: Vendor Advisory