{"vulnerability": "CVE-2024-20143", "sightings": [{"uuid": "5030fa0f-64f9-4653-8da8-8f3e329ae494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113779288504525189", "content": "", "creation_timestamp": "2025-01-06T03:29:23.699838Z"}, {"uuid": "d6188ad3-5748-4eb3-87ed-98dd1154b59e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113779302297257933", "content": "", "creation_timestamp": "2025-01-06T03:32:53.934256Z"}, {"uuid": "1b45352c-1bb6-4eca-80bb-249f01fa88fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2bkhlx3225", "content": "", "creation_timestamp": "2025-01-06T04:15:28.228974Z"}, {"uuid": "f09e72e4-817f-471a-b94b-de243618f696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf2d3c3rjd2q", "content": "", "creation_timestamp": "2025-01-06T04:42:51.516951Z"}, {"uuid": "a3dc268a-bcbc-4675-b57f-ac7df92aba57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/a5165ebe-ef02-4a51-b2a6-2950b3c37690", "content": "", "creation_timestamp": "2025-01-07T07:03:20.063825Z"}, {"uuid": "6018b541-59eb-4926-ba9f-48e044f9bb92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/a30ff14f-a073-49be-8c0c-6b6afd6a19f3", "content": "", "creation_timestamp": "2025-01-07T07:09:05.334532Z"}, {"uuid": "796aa9c2-0aaf-4d03-a02c-2093b6c09a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-pch9-mchm-3m6c\n\ud83d\udd17 Aliases: CVE-2024-20143\n\ud83d\udd39 Details: In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069.\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T06:30:45Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T06:30:45Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-787\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-20143\n2. https://corp.mediatek.com/product-security-bulletin/January-2025", "creation_timestamp": "2025-01-06T06:40:24.000000Z"}, {"uuid": "5fa7372c-edcd-423e-af3c-ebd4e9cf1635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20143", "type": "seen", "source": "https://t.me/cvedetector/14330", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20143 - Dell Venue 6 DA Out-of-Bounds Write Local Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-20143 \nPublished : Jan. 6, 2025, 4:15 a.m. | 44\u00a0minutes ago \nDescription : In V6 DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09167056; Issue ID: MSV-2069. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T06:03:27.000000Z"}]}