{"vulnerability": "CVE-2024-20865", "sightings": [{"uuid": "d2352c29-10a2-43e9-9e33-145486165733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20865", "type": "seen", "source": "Telegram/NYdS9asMYUEVFDN5vxF7JXeH3KfylkA486AJ1Oc3nt3Ms1XE", "content": "", "creation_timestamp": "2025-02-14T10:00:35.000000Z"}, {"uuid": "b5a2e13d-a1a3-4935-ab83-ba8e58c10fcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20865", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3666", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-19T19:27:30.000000Z"}, {"uuid": "ed720eeb-e836-4dde-8a4a-25a843525c17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20865", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11294", "content": "#Whitepaper\n#Mobile_Security\n#Hardware_Security\n\"When Samsung meets MediaTek: the story of a small bug chain\", 2024.\n]-&gt; Samsung Mediatek PoCs\n// CVE-2024-20820:\n    Read out-of-bound in ATF\n    CVE-2024-20021:\n    Remap physical memory in ATF\n    CVE-2024-20832:\n    Heap overflow in bootloader\n    CVE-2024-20865:\n    Authentication bypass in bootloader", "creation_timestamp": "2024-10-16T19:03:36.000000Z"}]}