{"vulnerability": "cve-2024-20152", "sightings": [{"uuid": "f533d433-f2db-4b38-b58c-6687bab0a74f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20152", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/160", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: GHSA-88jr-vqf8-xrxx\n\ud83d\udd17 Aliases: CVE-2024-20152\n\ud83d\udd39 Details: In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798.\n\ud83d\uddd3\ufe0f Modified: 2025-01-06T06:30:45Z\n\ud83d\uddd3\ufe0f Published: 2025-01-06T06:30:45Z\n\ud83c\udff7\ufe0f CWE IDs: CWE-617\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-20152\n2. https://corp.mediatek.com/product-security-bulletin/January-2025", "creation_timestamp": "2025-01-06T06:40:34.000000Z"}, {"uuid": "961e4d4a-7ccd-4000-80ef-c67fba1f3b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20152", "type": "seen", "source": "https://t.me/cvedetector/14326", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-20152 - Cisco Wireless wl drivers Denial of Service Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-20152 \nPublished : Jan. 6, 2025, 4:15 a.m. | 44\u00a0minutes ago \nDescription : In wlan STA driver, there is a possible reachable assertion due to improper exception handling. This could lead to local denial of service if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: WCNCR00389047 / ALPS09136505; Issue ID: MSV-1798. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T06:03:21.000000Z"}, {"uuid": "b2c0e455-9a9a-4c5b-a2e1-6bf4bc90f665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20152", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113779420423957530", "content": "", "creation_timestamp": "2025-01-06T04:02:56.445312Z"}, {"uuid": "790ed576-c541-4cca-b357-bef92e93182e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20152", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf2bl2jozs2a", "content": "", "creation_timestamp": "2025-01-06T04:15:48.100130Z"}, {"uuid": "9eaeb0b4-cae5-46a7-b706-f20609a91da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-20152", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf2d3bm3f62g", "content": "", "creation_timestamp": "2025-01-06T04:42:49.064933Z"}]}