CVE-2024-20017
📋 TL;DR
CVE-2024-20017 is a critical vulnerability in MediaTek Wi-Fi chipsets that allows remote code execution without authentication or user interaction. An out-of-bounds write in the wlan service enables attackers to execute arbitrary code on affected devices. This impacts routers, smartphones, IoT devices, and other products using vulnerable MediaTek Wi-Fi chipsets.
💻 Affected Systems
- MediaTek Wi-Fi chipsets
- Routers with MediaTek chips
- Smartphones with MediaTek processors
- IoT devices with MediaTek Wi-Fi
📦 What is this software?
Openwrt by Openwrt
Openwrt by Openwrt
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing persistent backdoor installation, data theft, network pivoting, and botnet recruitment.
Likely Case
Remote code execution leading to device takeover, credential harvesting, and lateral movement within networks.
If Mitigated
Limited impact with proper network segmentation, but still potential for isolated device compromise.
🎯 Exploit Status
Multiple exploitation methods documented, including zero-click attacks. Exploits available in wild targeting routers and mobile devices.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches released March 2024 with ID WCNCR00350938
Vendor Advisory: https://corp.mediatek.com/product-security-bulletin/March-2024
Restart Required: Yes
Instructions:
1. Check device manufacturer for firmware updates. 2. Apply latest firmware from device vendor. 3. For Android devices, check OEM security updates. 4. Reboot device after update.
🔧 Temporary Workarounds
Network Segmentation
allIsolate vulnerable devices from critical networks and internet exposure
Wi-Fi Disablement
allDisable Wi-Fi on affected devices if wired connectivity is sufficient
🧯 If You Can't Patch
- Segment vulnerable devices into isolated VLAN with strict firewall rules
- Implement network monitoring for suspicious Wi-Fi traffic patterns
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against manufacturer's patched versions. For Android: Settings > About phone > Android security update date (should be March 2024 or later).
Check Version:
Device-specific: Android: 'getprop ro.build.version.security_patch', Router: Check web interface or 'cat /etc/version'
Verify Fix Applied:
Verify firmware version includes March 2024 MediaTek security patches. Check for patch ID WCNCR00350938 in firmware release notes.
📡 Detection & Monitoring
Log Indicators:
- Unusual wlan service crashes
- Kernel panic logs related to Wi-Fi drivers
- Suspicious memory access errors
Network Indicators:
- Malformed Wi-Fi management frames
- Unusual broadcast/multicast traffic from devices
- Suspicious ARP or DHCP patterns
SIEM Query:
Example: (event_category="kernel" AND message="*wlan*" AND (message="*panic*" OR message="*oob*" OR message="*out of bounds*"))
🔗 References
- https://corp.mediatek.com/product-security-bulletin/March-2024
- https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
- https://blog.sonicwall.com/en-us/2024/09/critical-exploit-in-mediatek-wi-fi-chipsets-zero-click-vulnerability-cve-2024-20017-threatens-routers-and-smartphones/
- https://corp.mediatek.com/product-security-bulletin/March-2024
- https://news.ycombinator.com/item?id=41605680