{"vulnerability": "cve-2024-2002", "sightings": [{"uuid": "5628c7c2-e33e-440c-a5b0-e5b406284dcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2002", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11696", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-2002\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: A double-free vulnerability was found in libdwarf. In a multiply-corrupted DWARF object, libdwarf may try to dealloc(free) an allocation twice, potentially causing unpredictable and various results.\n\ud83d\udccf Published: 2024-03-18T12:26:31.386Z\n\ud83d\udccf Modified: 2025-04-14T20:45:50.229Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2024-2002\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2267700\n3. https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt", "creation_timestamp": "2025-04-14T20:54:29.000000Z"}, {"uuid": "19b1430b-54c8-4d94-90b3-15d2ad273fd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20020", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9445", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-20020\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In OPTEE, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08522504; Issue ID: ALPS08522504.\n\ud83d\udccf Published: 2024-03-04T02:43:24.572Z\n\ud83d\udccf Modified: 2025-03-28T19:10:14.806Z\n\ud83d\udd17 References:\n1. https://corp.mediatek.com/product-security-bulletin/March-2024", "creation_timestamp": "2025-03-28T19:29:16.000000Z"}, {"uuid": "58b7d05c-f347-471b-bac8-021aacdfee1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2002", "type": "seen", "source": "https://t.me/ctinow/210562", "content": "https://ift.tt/uifX9Uw\nCVE-2024-2002", "creation_timestamp": "2024-03-18T14:32:04.000000Z"}, {"uuid": "3ccbe521-2ca8-4085-8145-60de480e9fff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20021", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3666", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-19T19:27:30.000000Z"}, {"uuid": "9358b861-7912-4744-8784-71901aa16e17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2002", "type": "seen", "source": "https://t.me/ctinow/210545", "content": "https://ift.tt/uifX9Uw\nCVE-2024-2002", "creation_timestamp": "2024-03-18T14:26:13.000000Z"}, {"uuid": "a7bf8c30-b8b3-4fce-b71a-ba830759e4b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20029", "type": "seen", "source": "https://t.me/ctinow/198987", "content": "https://ift.tt/LZAeMpx\nCVE-2024-20029", "creation_timestamp": "2024-03-04T04:32:07.000000Z"}, {"uuid": "e5c1697e-bad7-4d82-a32f-672051daeb78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20024", "type": "seen", "source": "https://t.me/ctinow/198982", "content": "https://ift.tt/MIOiSDu\nCVE-2024-20024", "creation_timestamp": "2024-03-04T04:31:59.000000Z"}, {"uuid": "96cbaaf2-b5f1-48df-8447-7c5d69a1bb2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20028", "type": "seen", "source": "https://t.me/ctinow/198986", "content": "https://ift.tt/ecKwRU3\nCVE-2024-20028", "creation_timestamp": "2024-03-04T04:32:06.000000Z"}, {"uuid": "e469241b-e3e8-4f2e-8f86-b96f46aa243b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20026", "type": "seen", "source": "https://t.me/ctinow/198984", "content": "https://ift.tt/hGKPW53\nCVE-2024-20026", "creation_timestamp": "2024-03-04T04:32:01.000000Z"}, {"uuid": "2c18ecdb-e171-4354-9812-bbe5842d812c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20025", "type": "seen", "source": "https://t.me/ctinow/198983", "content": "https://ift.tt/tYcbBFu\nCVE-2024-20025", "creation_timestamp": "2024-03-04T04:32:00.000000Z"}, {"uuid": "043bd410-0a87-4298-bdc2-d1dd9942d2c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20023", "type": "seen", "source": "https://t.me/ctinow/198981", "content": "https://ift.tt/VapxhwJ\nCVE-2024-20023", "creation_timestamp": "2024-03-04T04:31:58.000000Z"}, {"uuid": "17543fe4-11e9-4aa9-b607-12c9666175bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20020", "type": "seen", "source": "https://t.me/ctinow/198979", "content": "https://ift.tt/zVZlKwf\nCVE-2024-20020", "creation_timestamp": "2024-03-04T04:31:56.000000Z"}, {"uuid": "beac6115-f159-4bf3-a3e2-a7c8d97035b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20027", "type": "seen", "source": "https://t.me/ctinow/198985", "content": "https://ift.tt/FoDNMcr\nCVE-2024-20027", "creation_timestamp": "2024-03-04T04:32:05.000000Z"}, {"uuid": "d9ee0998-d3ed-4097-8771-df81f1d8edda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20022", "type": "seen", "source": "https://t.me/ctinow/198980", "content": "https://ift.tt/ZXLTzpf\nCVE-2024-20022", "creation_timestamp": "2024-03-04T04:31:57.000000Z"}, {"uuid": "b37df8c2-3b0f-4f75-8cb1-faf1877c3ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20021", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11294", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-16T19:03:36.000000Z"}]}